Analysis

  • max time kernel
    59s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2022 06:32

General

  • Target

    CfGQYemJHRdTnFG.exe

  • Size

    117KB

  • MD5

    19358aa5a8795a331a7f742e98ee5e58

  • SHA1

    a94378675c169915e3b11ae3ac8b3a0a17f714ac

  • SHA256

    cd1124d49f6e248b69e167e7fb5914040da63675486608cfa035082a837fe6ff

  • SHA512

    fbd3b723e1c6684a01b24edd711a1d361052e92d5e76870f7b2141800a3542ee714872823183b25a79542bb6cb7b7564df1b04962ab0de3bd9333800a57363ae

  • SSDEEP

    3072:ZaOqc4zX7NK4w0qVc6j2D9bW0YBDrUbpgDwk:fF4zX7NKUGjg9ba

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CfGQYemJHRdTnFG.exe
    "C:\Users\Admin\AppData\Local\Temp\CfGQYemJHRdTnFG.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2012
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
            PID:820
          • C:\Windows\system32\findstr.exe
            findstr All
            3⤵
              PID:1264
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1660
            • C:\Windows\system32\chcp.com
              chcp 65001
              3⤵
                PID:1848
              • C:\Windows\system32\netsh.exe
                netsh wlan show networks mode=bssid
                3⤵
                  PID:840
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $source = 'C:\Users\Admin\AppData\Local\26657379f72a1daf37c54c9b62f1f431\Admin@GRXNNIIE_en-US';;$destination = 'C:\Users\Admin\AppData\Roaming/Admin-logs.zip';;If(Test-path $destination) {Remove-item $destination};;Add-Type -assembly 'system.io.compression.filesystem';;[io.compression.zipfile]::CreateFromDirectory($Source, $destination)
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2044
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 1884 -s 2032
                2⤵
                • Program crash
                PID:1256

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/820-59-0x000007FEFB5C1000-0x000007FEFB5C3000-memory.dmp

              Filesize

              8KB

            • memory/1884-54-0x0000000000010000-0x0000000000032000-memory.dmp

              Filesize

              136KB

            • memory/1884-67-0x000000001D246000-0x000000001D265000-memory.dmp

              Filesize

              124KB

            • memory/2044-66-0x000007FEEBAE0000-0x000007FEEC503000-memory.dmp

              Filesize

              10.1MB

            • memory/2044-69-0x00000000026B4000-0x00000000026B7000-memory.dmp

              Filesize

              12KB

            • memory/2044-68-0x000007FEEAF80000-0x000007FEEBADD000-memory.dmp

              Filesize

              11.4MB

            • memory/2044-71-0x00000000026B4000-0x00000000026B7000-memory.dmp

              Filesize

              12KB

            • memory/2044-72-0x00000000026BB000-0x00000000026DA000-memory.dmp

              Filesize

              124KB