Analysis
-
max time kernel
144s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-08-2022 09:34
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Strictor.274578.28312.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Strictor.274578.28312.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Variant.Strictor.274578.28312.exe
-
Size
852KB
-
MD5
ef6168fed961bcce0b3c7a63e2ab4f1a
-
SHA1
6ecf10e6b9d9978f706f868aeebd7cf169edcf74
-
SHA256
2bf197104a6418c886f206755e3f599ae9b1f90cf9771be981c30f427ecb228c
-
SHA512
4ab03a35eb2ed2cbde86f73463ea9c15ed21a0d9d68b1bf1042d80797d71a001204256bcfbdb6ae0f1a16dddc2ce4a42c892e33e893eb70e2af28ccee1c69939
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 4 IoCs
resource yara_rule behavioral1/memory/1636-78-0x00000000000B0000-0x00000000000CA000-memory.dmp family_stormkitty behavioral1/memory/1636-79-0x00000000000C4F6E-mapping.dmp family_stormkitty behavioral1/memory/1636-81-0x00000000000B0000-0x00000000000CA000-memory.dmp family_stormkitty behavioral1/memory/1636-83-0x00000000000B0000-0x00000000000CA000-memory.dmp family_stormkitty -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1812 set thread context of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1440 set thread context of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1272 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 1324 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeDebugPrivilege 1636 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1324 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 28 PID 1812 wrote to memory of 1324 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 28 PID 1812 wrote to memory of 1324 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 28 PID 1812 wrote to memory of 1324 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 28 PID 1812 wrote to memory of 1272 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 30 PID 1812 wrote to memory of 1272 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 30 PID 1812 wrote to memory of 1272 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 30 PID 1812 wrote to memory of 1272 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 30 PID 1812 wrote to memory of 588 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 32 PID 1812 wrote to memory of 588 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 32 PID 1812 wrote to memory of 588 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 32 PID 1812 wrote to memory of 588 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 32 PID 1812 wrote to memory of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1812 wrote to memory of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1812 wrote to memory of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1812 wrote to memory of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1812 wrote to memory of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1812 wrote to memory of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1812 wrote to memory of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1812 wrote to memory of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1812 wrote to memory of 1440 1812 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 33 PID 1440 wrote to memory of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 PID 1440 wrote to memory of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 PID 1440 wrote to memory of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 PID 1440 wrote to memory of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 PID 1440 wrote to memory of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 PID 1440 wrote to memory of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 PID 1440 wrote to memory of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 PID 1440 wrote to memory of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 PID 1440 wrote to memory of 1636 1440 SecuriteInfo.com.Variant.Strictor.274578.28312.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Strictor.274578.28312.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Strictor.274578.28312.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CZvwoAio.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CZvwoAio" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD49E.tmp"2⤵
- Creates scheduled task(s)
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Strictor.274578.28312.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Strictor.274578.28312.exe"2⤵PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Strictor.274578.28312.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Strictor.274578.28312.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1636
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5397202479762926cbd23fd014c6b28bc
SHA1f69655b77595b9f5485454e0ee9b874330a474d4
SHA256aa19af419f253caec1e0da38f0ff67844bfa137f132e119f08f6b411da09e459
SHA512ce06530b6627d0347be8f65beec2b95481fd612ee52058cecca697b65ab9234ce2e0d37be227a6bb04c335e44188e9625650115e8170c07ae934ce878c9155d5