Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 21:31

General

  • Target

    f59ced4cb1fe18a94e6640da8e12dce820a2a921367f17d8ca64be51f151d07e.exe

  • Size

    780KB

  • MD5

    84a5d4f71651972eec48a1f428df8e15

  • SHA1

    2926d1fff5994d2254693c51fd3a70206b7f3a84

  • SHA256

    f59ced4cb1fe18a94e6640da8e12dce820a2a921367f17d8ca64be51f151d07e

  • SHA512

    83276db60a8dac632789b4aa5619126aa17e28e48f05bcdadb347eb3ab64853732c59c9c10b9129a6736f4a3bfa2f396dd03f456ad07ae613354ef5ce1e68d02

  • SSDEEP

    24576:GvVO6KZEW9QB7xmIiIznRlpVawlrWQp+3:vbZi7lzrawlrWV3

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 9 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f59ced4cb1fe18a94e6640da8e12dce820a2a921367f17d8ca64be51f151d07e.exe
    "C:\Users\Admin\AppData\Local\Temp\f59ced4cb1fe18a94e6640da8e12dce820a2a921367f17d8ca64be51f151d07e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\AppData\Local\Temp\Jucpjvss.exe
      "C:\Users\Admin\AppData\Local\Temp\Jucpjvss.exe"
      2⤵
      • Executes dropped EXE
      PID:1552
    • C:\Users\Admin\AppData\Local\Temp\Ivggwxwfnqvw.exe
      "C:\Users\Admin\AppData\Local\Temp\Ivggwxwfnqvw.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Local\Temp\Telegram API ver8.84\TelegramAPI.exe
        "C:\Users\Admin\AppData\Local\Temp\Telegram API ver8.84\TelegramAPI.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:1644
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp203E.tmp.cmd""
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:680
          • C:\Windows\SysWOW64\timeout.exe
            timeout 4
            5⤵
            • Delays execution with timeout.exe
            PID:1096
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks.exe /create /f /sc MINUTE /mo 1 /tn "Telegram host service ver8.85" /tr "'C:\Users\Admin\AppData\Local\Temp\Telegram API ver8.84\TelegramAPI.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1540
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            5⤵
              PID:1788
            • C:\Windows\SysWOW64\netsh.exe
              netsh wlan show profile
              5⤵
                PID:308
              • C:\Windows\SysWOW64\findstr.exe
                findstr All
                5⤵
                  PID:1064
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1072
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  5⤵
                    PID:1556
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh wlan show networks mode=bssid
                    5⤵
                      PID:868
            • C:\Windows\system32\msiexec.exe
              C:\Windows\system32\msiexec.exe /V
              1⤵
                PID:1664
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {FEAD362B-D2CA-4FFA-8DA1-D67B45F3DD95} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:1468
                • C:\Users\Admin\AppData\Local\Temp\Telegram API ver8.84\TelegramAPI.exe
                  "C:\Users\Admin\AppData\Local\Temp\Telegram API ver8.84\TelegramAPI.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:1932

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Scheduled Task

              1
              T1053

              Persistence

              Scheduled Task

              1
              T1053

              Privilege Escalation

              Scheduled Task

              1
              T1053

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              System Information Discovery

              2
              T1082

              Query Registry

              1
              T1012

              Collection

              Data from Local System

              2
              T1005

              Email Collection

              1
              T1114

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\5369D0120225D757812B
                Filesize

                266B

                MD5

                906eb4eba2c4603730e603c1df1b79e7

                SHA1

                085872b06f705cd104e3c51232e663a196eb3236

                SHA256

                b8d4d5b02e2ce3f705b3d2cfb24eb5d7dc5dbbdd7315426ac856dcfa58e4fcf3

                SHA512

                3f16663143dcb353ddab1d79a0e6f4d4c3aa2cdf6df1f76f4c7d4e266f67157289a269d6fd3dfccd79347b7517a860034bfda7ba252ed6be39814adaddb31f70

              • C:\Users\Admin\AppData\Local\Temp\Ivggwxwfnqvw.exe
                Filesize

                660KB

                MD5

                6871ac1e5748b36b8ba9535d979d4091

                SHA1

                444ddfc86010ffb7d0d06d8166c8b65f1f89f9b3

                SHA256

                8966a400b37314c1480ab2a04dd7504ee93eae3b85750feaeda55d8a3e772d8c

                SHA512

                983333a39d3c13dc1f8543b9e2bd99e69fa998e15ff8ea61193ee093beb918abc823ab191202dfc32a8c2394c7223e66fcd7837a5f5b32e3a670730a9fa3c39b

              • C:\Users\Admin\AppData\Local\Temp\Ivggwxwfnqvw.exe
                Filesize

                660KB

                MD5

                6871ac1e5748b36b8ba9535d979d4091

                SHA1

                444ddfc86010ffb7d0d06d8166c8b65f1f89f9b3

                SHA256

                8966a400b37314c1480ab2a04dd7504ee93eae3b85750feaeda55d8a3e772d8c

                SHA512

                983333a39d3c13dc1f8543b9e2bd99e69fa998e15ff8ea61193ee093beb918abc823ab191202dfc32a8c2394c7223e66fcd7837a5f5b32e3a670730a9fa3c39b

              • C:\Users\Admin\AppData\Local\Temp\Jucpjvss.exe
                Filesize

                172KB

                MD5

                4e288f438a0ef8a258f56dc24b6c6a6f

                SHA1

                0f53f19712ac703f15763eef7ce88eef53b486ee

                SHA256

                03544a96cd68984cdea793aed35fbc7c87183909b5037b1850c7065c29eb477a

                SHA512

                ca282f188b81fff1f0f950cc1eefe140da4836d38f134b35000db4d5debdb05898f6b88e5b4f66ef34016c272a879d206af1e49bfbb977d6f2531a4fa8ff87c4

              • C:\Users\Admin\AppData\Local\Temp\Jucpjvss.exe
                Filesize

                172KB

                MD5

                4e288f438a0ef8a258f56dc24b6c6a6f

                SHA1

                0f53f19712ac703f15763eef7ce88eef53b486ee

                SHA256

                03544a96cd68984cdea793aed35fbc7c87183909b5037b1850c7065c29eb477a

                SHA512

                ca282f188b81fff1f0f950cc1eefe140da4836d38f134b35000db4d5debdb05898f6b88e5b4f66ef34016c272a879d206af1e49bfbb977d6f2531a4fa8ff87c4

              • C:\Users\Admin\AppData\Local\Temp\Telegram API ver8.84\TelegramAPI.exe
                Filesize

                660KB

                MD5

                6871ac1e5748b36b8ba9535d979d4091

                SHA1

                444ddfc86010ffb7d0d06d8166c8b65f1f89f9b3

                SHA256

                8966a400b37314c1480ab2a04dd7504ee93eae3b85750feaeda55d8a3e772d8c

                SHA512

                983333a39d3c13dc1f8543b9e2bd99e69fa998e15ff8ea61193ee093beb918abc823ab191202dfc32a8c2394c7223e66fcd7837a5f5b32e3a670730a9fa3c39b

              • C:\Users\Admin\AppData\Local\Temp\Telegram API ver8.84\TelegramAPI.exe
                Filesize

                660KB

                MD5

                6871ac1e5748b36b8ba9535d979d4091

                SHA1

                444ddfc86010ffb7d0d06d8166c8b65f1f89f9b3

                SHA256

                8966a400b37314c1480ab2a04dd7504ee93eae3b85750feaeda55d8a3e772d8c

                SHA512

                983333a39d3c13dc1f8543b9e2bd99e69fa998e15ff8ea61193ee093beb918abc823ab191202dfc32a8c2394c7223e66fcd7837a5f5b32e3a670730a9fa3c39b

              • C:\Users\Admin\AppData\Local\Temp\Telegram API ver8.84\TelegramAPI.exe
                Filesize

                660KB

                MD5

                6871ac1e5748b36b8ba9535d979d4091

                SHA1

                444ddfc86010ffb7d0d06d8166c8b65f1f89f9b3

                SHA256

                8966a400b37314c1480ab2a04dd7504ee93eae3b85750feaeda55d8a3e772d8c

                SHA512

                983333a39d3c13dc1f8543b9e2bd99e69fa998e15ff8ea61193ee093beb918abc823ab191202dfc32a8c2394c7223e66fcd7837a5f5b32e3a670730a9fa3c39b

              • C:\Users\Admin\AppData\Local\Temp\tmp203E.tmp.cmd
                Filesize

                287B

                MD5

                21bb00dabd6ac2f4093eaa0dca6bfbfe

                SHA1

                323aabf62b263241ede1a13b9fbc16d941ef98df

                SHA256

                a49dac635abda5e0c69ef5d118f8443bc4969015de0407519808addc206e720c

                SHA512

                75e6e45df628048ca82b987ccad45bd63edc407102ac6b4006b785c0aa569d3874506594f3bbfa77c0743c80411f6f3dbf7373789cc0baf7a403509e54c0d83b

              • \Users\Admin\AppData\Local\Temp\Ivggwxwfnqvw.exe
                Filesize

                660KB

                MD5

                6871ac1e5748b36b8ba9535d979d4091

                SHA1

                444ddfc86010ffb7d0d06d8166c8b65f1f89f9b3

                SHA256

                8966a400b37314c1480ab2a04dd7504ee93eae3b85750feaeda55d8a3e772d8c

                SHA512

                983333a39d3c13dc1f8543b9e2bd99e69fa998e15ff8ea61193ee093beb918abc823ab191202dfc32a8c2394c7223e66fcd7837a5f5b32e3a670730a9fa3c39b

              • \Users\Admin\AppData\Local\Temp\Jucpjvss.exe
                Filesize

                172KB

                MD5

                4e288f438a0ef8a258f56dc24b6c6a6f

                SHA1

                0f53f19712ac703f15763eef7ce88eef53b486ee

                SHA256

                03544a96cd68984cdea793aed35fbc7c87183909b5037b1850c7065c29eb477a

                SHA512

                ca282f188b81fff1f0f950cc1eefe140da4836d38f134b35000db4d5debdb05898f6b88e5b4f66ef34016c272a879d206af1e49bfbb977d6f2531a4fa8ff87c4

              • \Users\Admin\AppData\Local\Temp\Telegram API ver8.84\TelegramAPI.exe
                Filesize

                660KB

                MD5

                6871ac1e5748b36b8ba9535d979d4091

                SHA1

                444ddfc86010ffb7d0d06d8166c8b65f1f89f9b3

                SHA256

                8966a400b37314c1480ab2a04dd7504ee93eae3b85750feaeda55d8a3e772d8c

                SHA512

                983333a39d3c13dc1f8543b9e2bd99e69fa998e15ff8ea61193ee093beb918abc823ab191202dfc32a8c2394c7223e66fcd7837a5f5b32e3a670730a9fa3c39b

              • memory/308-88-0x0000000000000000-mapping.dmp
              • memory/680-76-0x0000000000000000-mapping.dmp
              • memory/868-89-0x0000000000000000-mapping.dmp
              • memory/1008-54-0x0000000000400000-0x00000000004CA000-memory.dmp
                Filesize

                808KB

              • memory/1008-55-0x0000000075C51000-0x0000000075C53000-memory.dmp
                Filesize

                8KB

              • memory/1064-90-0x0000000000000000-mapping.dmp
              • memory/1072-85-0x0000000000000000-mapping.dmp
              • memory/1096-78-0x0000000000000000-mapping.dmp
              • memory/1504-71-0x0000000004A45000-0x0000000004A56000-memory.dmp
                Filesize

                68KB

              • memory/1504-62-0x0000000000000000-mapping.dmp
              • memory/1504-65-0x0000000001160000-0x000000000120C000-memory.dmp
                Filesize

                688KB

              • memory/1540-82-0x0000000000000000-mapping.dmp
              • memory/1552-57-0x0000000000000000-mapping.dmp
              • memory/1552-60-0x0000000000F30000-0x0000000000F60000-memory.dmp
                Filesize

                192KB

              • memory/1552-80-0x0000000004DD5000-0x0000000004DE6000-memory.dmp
                Filesize

                68KB

              • memory/1556-87-0x0000000000000000-mapping.dmp
              • memory/1644-69-0x0000000000000000-mapping.dmp
              • memory/1644-83-0x00000000006A5000-0x00000000006B6000-memory.dmp
                Filesize

                68KB

              • memory/1644-81-0x00000000006A5000-0x00000000006B6000-memory.dmp
                Filesize

                68KB

              • memory/1644-73-0x00000000013B0000-0x000000000145C000-memory.dmp
                Filesize

                688KB

              • memory/1644-79-0x00000000058C0000-0x0000000005936000-memory.dmp
                Filesize

                472KB

              • memory/1724-84-0x0000000000000000-mapping.dmp
              • memory/1788-86-0x0000000000000000-mapping.dmp
              • memory/1932-93-0x0000000000000000-mapping.dmp