Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/12/2022, 01:43
Behavioral task
behavioral1
Sample
09ee64f8bb9aebb6a09da283e34c528a.exe
Resource
win7-20220901-en
General
-
Target
09ee64f8bb9aebb6a09da283e34c528a.exe
-
Size
232KB
-
MD5
09ee64f8bb9aebb6a09da283e34c528a
-
SHA1
3b55fff91903daf89131c1ee51653c7cf4027d18
-
SHA256
e03f6c4f04ef25238b6d7c8a447555402caa7d1ddb1803bbb6cbcb889cab1135
-
SHA512
e12a387b578dc1b1307e9bc7fb43e9da5b4a10106958fb329e171f8851767911814e74e2c7468460d00a9adf1691430be28439a087e12383a16a27b8e490aebf
-
SSDEEP
6144:bDubaBBOBIIj6HLLYLCYJqvc1DMaJ+2+AHbEr1peYGrNNaR0NUg:ubaj9Gk1pLZi
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5841906429:AAHSe6la_NGlt9rOSoOwJAowwZ6H54N0dWA/sendMessage?chat_id=5816850831
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4872-132-0x0000000000D80000-0x0000000000DC0000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4872-132-0x0000000000D80000-0x0000000000DC0000-memory.dmp asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation 09ee64f8bb9aebb6a09da283e34c528a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 9 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\86ee1424b6fe8f5e712460625fa95ff4\Admin@COXNLIOB_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 09ee64f8bb9aebb6a09da283e34c528a.exe File created C:\Users\Admin\AppData\Local\86ee1424b6fe8f5e712460625fa95ff4\Admin@COXNLIOB_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini 09ee64f8bb9aebb6a09da283e34c528a.exe File created C:\Users\Admin\AppData\Local\86ee1424b6fe8f5e712460625fa95ff4\Admin@COXNLIOB_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini 09ee64f8bb9aebb6a09da283e34c528a.exe File created C:\Users\Admin\AppData\Local\86ee1424b6fe8f5e712460625fa95ff4\Admin@COXNLIOB_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 09ee64f8bb9aebb6a09da283e34c528a.exe File created C:\Users\Admin\AppData\Local\86ee1424b6fe8f5e712460625fa95ff4\Admin@COXNLIOB_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini 09ee64f8bb9aebb6a09da283e34c528a.exe File created C:\Users\Admin\AppData\Local\86ee1424b6fe8f5e712460625fa95ff4\Admin@COXNLIOB_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 09ee64f8bb9aebb6a09da283e34c528a.exe File opened for modification C:\Users\Admin\AppData\Local\86ee1424b6fe8f5e712460625fa95ff4\Admin@COXNLIOB_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini 09ee64f8bb9aebb6a09da283e34c528a.exe File opened for modification C:\Users\Admin\AppData\Local\86ee1424b6fe8f5e712460625fa95ff4\Admin@COXNLIOB_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 09ee64f8bb9aebb6a09da283e34c528a.exe File created C:\Users\Admin\AppData\Local\86ee1424b6fe8f5e712460625fa95ff4\Admin@COXNLIOB_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 09ee64f8bb9aebb6a09da283e34c528a.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 09ee64f8bb9aebb6a09da283e34c528a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 09ee64f8bb9aebb6a09da283e34c528a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4036 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 4872 09ee64f8bb9aebb6a09da283e34c528a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4872 09ee64f8bb9aebb6a09da283e34c528a.exe Token: SeDebugPrivilege 4872 09ee64f8bb9aebb6a09da283e34c528a.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4872 wrote to memory of 3720 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 86 PID 4872 wrote to memory of 3720 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 86 PID 4872 wrote to memory of 3720 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 86 PID 3720 wrote to memory of 4404 3720 cmd.exe 88 PID 3720 wrote to memory of 4404 3720 cmd.exe 88 PID 3720 wrote to memory of 4404 3720 cmd.exe 88 PID 3720 wrote to memory of 772 3720 cmd.exe 89 PID 3720 wrote to memory of 772 3720 cmd.exe 89 PID 3720 wrote to memory of 772 3720 cmd.exe 89 PID 3720 wrote to memory of 3708 3720 cmd.exe 90 PID 3720 wrote to memory of 3708 3720 cmd.exe 90 PID 3720 wrote to memory of 3708 3720 cmd.exe 90 PID 4872 wrote to memory of 3884 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 91 PID 4872 wrote to memory of 3884 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 91 PID 4872 wrote to memory of 3884 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 91 PID 3884 wrote to memory of 824 3884 cmd.exe 93 PID 3884 wrote to memory of 824 3884 cmd.exe 93 PID 3884 wrote to memory of 824 3884 cmd.exe 93 PID 3884 wrote to memory of 924 3884 cmd.exe 94 PID 3884 wrote to memory of 924 3884 cmd.exe 94 PID 3884 wrote to memory of 924 3884 cmd.exe 94 PID 4872 wrote to memory of 4036 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 95 PID 4872 wrote to memory of 4036 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 95 PID 4872 wrote to memory of 4036 4872 09ee64f8bb9aebb6a09da283e34c528a.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\09ee64f8bb9aebb6a09da283e34c528a.exe"C:\Users\Admin\AppData\Local\Temp\09ee64f8bb9aebb6a09da283e34c528a.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:4404
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:772
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:3708
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:824
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:924
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /sc ONLOGON /RL HIGHEST /tn "Chrome Update" /tr "C:\Users\Admin\AppData\Local\Temp\09ee64f8bb9aebb6a09da283e34c528a.exe"2⤵
- Creates scheduled task(s)
PID:4036
-