Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 20:25

General

  • Target

    c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2.exe

  • Size

    3.4MB

  • MD5

    a75a69c8e7d43c798214ecfe57397224

  • SHA1

    5eea407838965192b0785ae08e7c7b4dbf900e33

  • SHA256

    c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2

  • SHA512

    13cfcacf1c0fe8cb80a775394720fc1f77c14e36d187356ff9d60a37bd1cf0ff14f2a85780437981db5b1411218a1dbd85f93f4b1053d9196679a7d149949d5a

  • SSDEEP

    49152:WelMheDwmXQVKk2rBkyD3RZDaCAxQs8VlIiWSk8hM0wGUsfisgEWmBMbLCDrYGE5:7L8ArGoaCls8VlIkkgMlGUkMqoX

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 3 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2.exe
    "C:\Users\Admin\AppData\Local\Temp\c5ca3b412412cb576b80cd5ceabbf8997a1e8b7ad110545c4a0fbaece8acb4a2.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp5533.tmp.cmd""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\SysWOW64\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:568

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp5533.tmp.cmd
    Filesize

    246B

    MD5

    c6dd9e242dff12ac702084b204c96965

    SHA1

    e7941a7c9eea8bddc56854e087d0d404e50a9d11

    SHA256

    7a4c6ff4526d75723273b2e7067863397239235eb2dc8f4f87f6470cd30119ad

    SHA512

    57abed70b87a05752be73e7506a51fda3338d0017a5c2f625b993e281e7f22dfc2351051a1a918ffbf6b3cdbf07d37678b48672efb1465762f6a0c7ad8618b2f

  • memory/568-68-0x0000000000000000-mapping.dmp
  • memory/1120-64-0x0000000000000000-mapping.dmp
  • memory/1720-62-0x00000000052F5000-0x0000000005306000-memory.dmp
    Filesize

    68KB

  • memory/1720-60-0x0000000001290000-0x0000000001B16000-memory.dmp
    Filesize

    8.5MB

  • memory/1720-61-0x0000000004F20000-0x0000000004F98000-memory.dmp
    Filesize

    480KB

  • memory/1720-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp
    Filesize

    8KB

  • memory/1720-63-0x0000000005890000-0x0000000005906000-memory.dmp
    Filesize

    472KB

  • memory/1720-59-0x0000000001290000-0x0000000001B16000-memory.dmp
    Filesize

    8.5MB

  • memory/1720-65-0x0000000001290000-0x0000000001B16000-memory.dmp
    Filesize

    8.5MB

  • memory/1720-58-0x0000000077130000-0x00000000772B0000-memory.dmp
    Filesize

    1.5MB

  • memory/1720-66-0x0000000077130000-0x00000000772B0000-memory.dmp
    Filesize

    1.5MB

  • memory/1720-57-0x0000000001290000-0x0000000001B16000-memory.dmp
    Filesize

    8.5MB