Analysis
-
max time kernel
151s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2022 10:45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetectNet.01.4201.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.AIDetectNet.01.4201.exe
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.4201.exe
-
Size
31KB
-
MD5
993af3de9afbbf18492a7624dc1520d0
-
SHA1
ffbbb6e36177177f00641f248e0a597d14d5a860
-
SHA256
519049c140f5a4f0d6d2115f921d105b1bd4bf46f2e9f66a45762ba5c9cda9e0
-
SHA512
c59274fce6b8a066a6b38988dd159ef09d964bdce7457f18da481e21a70bffa636411b5e386abf23c27c5a494d5a7bbe1ec4a0548f6f22977d59b682632b285a
-
SSDEEP
768:6XaPBXOLr3u9Ngw1MYwVL6nXfelWhl9lqSg6KJY6Zy:6XaJ+ZkMP6nXcWhl9lqS3Kfy
Malware Config
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/1844-154-0x00000000007C0000-0x00000000007DA000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.W32.AIDetectNet.01.4201.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zvgbxgi = "\"C:\\Users\\Admin\\AppData\\Roaming\\Zovopilhb\\Zvgbxgi.exe\"" SecuriteInfo.com.W32.AIDetectNet.01.4201.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 460 set thread context of 1056 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 91 PID 1056 set thread context of 1844 1056 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AppLaunch.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4856 powershell.exe 4856 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1056 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe Token: SeDebugPrivilege 4856 powershell.exe Token: SeDebugPrivilege 1844 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1056 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 460 wrote to memory of 4856 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 82 PID 460 wrote to memory of 4856 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 82 PID 460 wrote to memory of 4856 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 82 PID 460 wrote to memory of 1056 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 91 PID 460 wrote to memory of 1056 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 91 PID 460 wrote to memory of 1056 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 91 PID 460 wrote to memory of 1056 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 91 PID 460 wrote to memory of 1056 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 91 PID 460 wrote to memory of 1056 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 91 PID 460 wrote to memory of 1056 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 91 PID 460 wrote to memory of 1056 460 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 91 PID 1056 wrote to memory of 1844 1056 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 92 PID 1056 wrote to memory of 1844 1056 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 92 PID 1056 wrote to memory of 1844 1056 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 92 PID 1056 wrote to memory of 1844 1056 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 92 PID 1056 wrote to memory of 1844 1056 SecuriteInfo.com.W32.AIDetectNet.01.4201.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1502147629-2175634256-330282290-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.4201.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.4201.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.4201.exeC:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.4201.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1844
-
-