Overview
overview
10Static
static
10AfMaRTHbXDQeEqK.exe
windows7-x64
1AfMaRTHbXDQeEqK.exe
windows10-2004-x64
1AnZNZkqSCLtCdJP.exe
windows7-x64
10AnZNZkqSCLtCdJP.exe
windows10-2004-x64
10AwHQZpWsBXMfKoP.exe
windows7-x64
1AwHQZpWsBXMfKoP.exe
windows10-2004-x64
1AxStJPBXbsGYNCc.exe
windows7-x64
10AxStJPBXbsGYNCc.exe
windows10-2004-x64
10BcJRFxiQTFDdmBX.exe
windows7-x64
10BcJRFxiQTFDdmBX.exe
windows10-2004-x64
10BeRWDywBMMSobQZ.exe
windows7-x64
10BeRWDywBMMSobQZ.exe
windows10-2004-x64
10BgNDTadHLDiJwMQ.exe
windows7-x64
10BgNDTadHLDiJwMQ.exe
windows10-2004-x64
10BjWXPytPSJRdiLA.exe
windows7-x64
1BjWXPytPSJRdiLA.exe
windows10-2004-x64
7BmGjLSDwCWXaZqK.exe
windows7-x64
10BmGjLSDwCWXaZqK.exe
windows10-2004-x64
10CfGQYemJHRdTnFG.exe
windows7-x64
10CfGQYemJHRdTnFG.exe
windows10-2004-x64
10CgENMjeJGCZcdAF.exe
windows7-x64
10CgENMjeJGCZcdAF.exe
windows10-2004-x64
10CjYrWNZyEcMBBMa.exe
windows7-x64
8CjYrWNZyEcMBBMa.exe
windows10-2004-x64
8CsFbNASzLBKdkHR.exe
windows7-x64
10CsFbNASzLBKdkHR.exe
windows10-2004-x64
10DaGdSGFqZFBbLpA.exe
windows7-x64
10DaGdSGFqZFBbLpA.exe
windows10-2004-x64
10DcDJLimAFTYswMQ.exe
windows7-x64
10DcDJLimAFTYswMQ.exe
windows10-2004-x64
10aCRAEzePNKKgoZZ.exe
windows7-x64
10aCRAEzePNKKgoZZ.exe
windows10-2004-x64
10Analysis
-
max time kernel
59s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-08-2022 06:32
Static task
static1
Behavioral task
behavioral1
Sample
AfMaRTHbXDQeEqK.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AfMaRTHbXDQeEqK.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
AnZNZkqSCLtCdJP.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
AnZNZkqSCLtCdJP.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
AwHQZpWsBXMfKoP.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
AwHQZpWsBXMfKoP.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
AxStJPBXbsGYNCc.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
AxStJPBXbsGYNCc.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
BcJRFxiQTFDdmBX.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
BcJRFxiQTFDdmBX.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
BeRWDywBMMSobQZ.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
BeRWDywBMMSobQZ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
BgNDTadHLDiJwMQ.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
BgNDTadHLDiJwMQ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
BjWXPytPSJRdiLA.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
BjWXPytPSJRdiLA.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
BmGjLSDwCWXaZqK.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
BmGjLSDwCWXaZqK.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
CfGQYemJHRdTnFG.exe
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
CfGQYemJHRdTnFG.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
CgENMjeJGCZcdAF.exe
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
CgENMjeJGCZcdAF.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
CjYrWNZyEcMBBMa.exe
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
CjYrWNZyEcMBBMa.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
CsFbNASzLBKdkHR.exe
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
CsFbNASzLBKdkHR.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
DaGdSGFqZFBbLpA.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
DaGdSGFqZFBbLpA.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
DcDJLimAFTYswMQ.exe
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
DcDJLimAFTYswMQ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
aCRAEzePNKKgoZZ.exe
Resource
win7-20220812-en
General
-
Target
CfGQYemJHRdTnFG.exe
-
Size
117KB
-
MD5
19358aa5a8795a331a7f742e98ee5e58
-
SHA1
a94378675c169915e3b11ae3ac8b3a0a17f714ac
-
SHA256
cd1124d49f6e248b69e167e7fb5914040da63675486608cfa035082a837fe6ff
-
SHA512
fbd3b723e1c6684a01b24edd711a1d361052e92d5e76870f7b2141800a3542ee714872823183b25a79542bb6cb7b7564df1b04962ab0de3bd9333800a57363ae
-
SSDEEP
3072:ZaOqc4zX7NK4w0qVc6j2D9bW0YBDrUbpgDwk:fF4zX7NKUGjg9ba
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral19/memory/1884-54-0x0000000000010000-0x0000000000032000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1256 1884 WerFault.exe 26 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 CfGQYemJHRdTnFG.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 CfGQYemJHRdTnFG.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1884 CfGQYemJHRdTnFG.exe 1884 CfGQYemJHRdTnFG.exe 1884 CfGQYemJHRdTnFG.exe 2044 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1884 CfGQYemJHRdTnFG.exe Token: SeDebugPrivilege 2044 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1884 wrote to memory of 988 1884 CfGQYemJHRdTnFG.exe 28 PID 1884 wrote to memory of 988 1884 CfGQYemJHRdTnFG.exe 28 PID 1884 wrote to memory of 988 1884 CfGQYemJHRdTnFG.exe 28 PID 988 wrote to memory of 2012 988 cmd.exe 30 PID 988 wrote to memory of 2012 988 cmd.exe 30 PID 988 wrote to memory of 2012 988 cmd.exe 30 PID 988 wrote to memory of 820 988 cmd.exe 31 PID 988 wrote to memory of 820 988 cmd.exe 31 PID 988 wrote to memory of 820 988 cmd.exe 31 PID 988 wrote to memory of 1264 988 cmd.exe 32 PID 988 wrote to memory of 1264 988 cmd.exe 32 PID 988 wrote to memory of 1264 988 cmd.exe 32 PID 1884 wrote to memory of 1660 1884 CfGQYemJHRdTnFG.exe 33 PID 1884 wrote to memory of 1660 1884 CfGQYemJHRdTnFG.exe 33 PID 1884 wrote to memory of 1660 1884 CfGQYemJHRdTnFG.exe 33 PID 1660 wrote to memory of 1848 1660 cmd.exe 35 PID 1660 wrote to memory of 1848 1660 cmd.exe 35 PID 1660 wrote to memory of 1848 1660 cmd.exe 35 PID 1660 wrote to memory of 840 1660 cmd.exe 36 PID 1660 wrote to memory of 840 1660 cmd.exe 36 PID 1660 wrote to memory of 840 1660 cmd.exe 36 PID 1884 wrote to memory of 2044 1884 CfGQYemJHRdTnFG.exe 37 PID 1884 wrote to memory of 2044 1884 CfGQYemJHRdTnFG.exe 37 PID 1884 wrote to memory of 2044 1884 CfGQYemJHRdTnFG.exe 37 PID 1884 wrote to memory of 1256 1884 CfGQYemJHRdTnFG.exe 39 PID 1884 wrote to memory of 1256 1884 CfGQYemJHRdTnFG.exe 39 PID 1884 wrote to memory of 1256 1884 CfGQYemJHRdTnFG.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\CfGQYemJHRdTnFG.exe"C:\Users\Admin\AppData\Local\Temp\CfGQYemJHRdTnFG.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2012
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:820
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:1264
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1848
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵PID:840
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $source = 'C:\Users\Admin\AppData\Local\26657379f72a1daf37c54c9b62f1f431\Admin@GRXNNIIE_en-US';;$destination = 'C:\Users\Admin\AppData\Roaming/Admin-logs.zip';;If(Test-path $destination) {Remove-item $destination};;Add-Type -assembly 'system.io.compression.filesystem';;[io.compression.zipfile]::CreateFromDirectory($Source, $destination)2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1884 -s 20322⤵
- Program crash
PID:1256
-