Analysis
-
max time kernel
161s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:51
Behavioral task
behavioral1
Sample
1a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a.exe
Resource
win10v2004-20220812-en
General
-
Target
1a.exe
-
Size
1.4MB
-
MD5
80467b17d18000d6fab38846004e81ea
-
SHA1
1ffbeeeb77a563e7068cbd85c5d2ee2423e01017
-
SHA256
1aa7b910d99ef87d29be0bc96c4cf3a2823fea04fafd2a4b736c1156d73b2bb0
-
SHA512
8ca8ddd7609afa50c15927aec910e9a077ffc89aa213d4f3a0bd4c2be7d7e5f4374a06cb58f0f726715e867376f08fbbea16c32ea1286e4b832b496b6d7a42e9
-
SSDEEP
24576:CofiMngrdePNzQ0ZIxNXaV9x4IUgs36BUI2So5+jnzFYCaGApu8:7TgReFs0ZM0T+Sk6BU7HIFY7G98
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3748-132-0x0000000000BB0000-0x0000000000D12000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 checkip.dyndns.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1a.exedescription pid process Token: SeDebugPrivilege 3748 1a.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
1a.execmd.execmd.exedescription pid process target process PID 3748 wrote to memory of 4824 3748 1a.exe cmd.exe PID 3748 wrote to memory of 4824 3748 1a.exe cmd.exe PID 4824 wrote to memory of 1040 4824 cmd.exe chcp.com PID 4824 wrote to memory of 1040 4824 cmd.exe chcp.com PID 4824 wrote to memory of 996 4824 cmd.exe netsh.exe PID 4824 wrote to memory of 996 4824 cmd.exe netsh.exe PID 4824 wrote to memory of 1028 4824 cmd.exe findstr.exe PID 4824 wrote to memory of 1028 4824 cmd.exe findstr.exe PID 3748 wrote to memory of 2128 3748 1a.exe cmd.exe PID 3748 wrote to memory of 2128 3748 1a.exe cmd.exe PID 2128 wrote to memory of 2056 2128 cmd.exe chcp.com PID 2128 wrote to memory of 2056 2128 cmd.exe chcp.com PID 2128 wrote to memory of 4236 2128 cmd.exe netsh.exe PID 2128 wrote to memory of 4236 2128 cmd.exe netsh.exe PID 2128 wrote to memory of 2136 2128 cmd.exe findstr.exe PID 2128 wrote to memory of 2136 2128 cmd.exe findstr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a.exe"C:\Users\Admin\AppData\Local\Temp\1a.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1040
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:996
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:1028
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name=65001 key=clear | findstr Key2⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2056
-
C:\Windows\system32\netsh.exenetsh wlan show profile name=65001 key=clear3⤵PID:4236
-
C:\Windows\system32\findstr.exefindstr Key3⤵PID:2136