Analysis

  • max time kernel
    360s
  • max time network
    359s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/03/2023, 16:45

General

  • Target

    Beaming_1.exe

  • Size

    3.8MB

  • MD5

    f8f4beee36644a8f1900d444c60095a7

  • SHA1

    ec35d449980bc841da9ac9e05d9e70544b288187

  • SHA256

    4c1edb68278dfcdedc31fe0668e4ab99bb96304f34e986ca88b8e1cfbeeb7458

  • SHA512

    3c8eb4c206707aa4d21e3aecb13509088252ce5320149f3b42fe65a40c7784adcac08055d1a3bcbe4dd91027fd7d3154f7ac56597d3ec330063fe9be69e7cbc6

  • SSDEEP

    49152:8KkxfRMi34wtlCt0MHfgQmikU9EVLMl0OfAVG9vxBID8BH43vZiKz9IjQvk6Bh57:zkxf934wt4mjTxwf54DMpkvj84228

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • NirSoft WebBrowserPassView 3 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Beaming_1.exe
    "C:\Users\Admin\AppData\Local\Temp\Beaming_1.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3212
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C start %temp%\svchoster.exe /stext "%temp%\Passes.cpp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4208
      • C:\Users\Admin\AppData\Local\Temp\svchoster.exe
        C:\Users\Admin\AppData\Local\Temp\svchoster.exe /stext "C:\Users\Admin\AppData\Local\Temp\Passes.cpp"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1452
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
          PID:1008
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          3⤵
            PID:1580
          • C:\Windows\SysWOW64\findstr.exe
            findstr All
            3⤵
              PID:1568
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 2204
            2⤵
            • Program crash
            PID:4540
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:4580
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe"
            2⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2968
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2968.0.2144974035\718694463" -parentBuildID 20221007134813 -prefsHandle 1668 -prefMapHandle 1660 -prefsLen 20888 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c30ea3e5-ae2a-44f2-85de-285793c1866e} 2968 "\\.\pipe\gecko-crash-server-pipe.2968" 1748 280977f4f58 gpu
              3⤵
                PID:3856
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2968.1.1991506219\324474704" -parentBuildID 20221007134813 -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 20969 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9134eeaf-6148-4340-a21d-99717a4ae0be} 2968 "\\.\pipe\gecko-crash-server-pipe.2968" 2104 28097710a58 socket
                3⤵
                  PID:5060
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2968.2.2100040152\64228297" -childID 1 -isForBrowser -prefsHandle 2892 -prefMapHandle 2860 -prefsLen 21117 -prefMapSize 232675 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {faf0c91d-d494-4ef5-a50f-64d4d76135f3} 2968 "\\.\pipe\gecko-crash-server-pipe.2968" 2676 2809b3f0b58 tab
                  3⤵
                    PID:1748
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2968.3.1444979997\378456404" -childID 2 -isForBrowser -prefsHandle 3576 -prefMapHandle 1556 -prefsLen 26562 -prefMapSize 232675 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5cdb6222-41f7-4170-b9f7-32ae28613bf5} 2968 "\\.\pipe\gecko-crash-server-pipe.2968" 3588 2808c16dc58 tab
                    3⤵
                      PID:3028
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2968.4.40062972\448299562" -childID 3 -isForBrowser -prefsHandle 3764 -prefMapHandle 3756 -prefsLen 26562 -prefMapSize 232675 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {043911a0-f490-4ee9-bf2c-b627d8eea8bf} 2968 "\\.\pipe\gecko-crash-server-pipe.2968" 3768 2809c458e58 tab
                      3⤵
                        PID:2952
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2968.5.528296416\1492649577" -childID 4 -isForBrowser -prefsHandle 4736 -prefMapHandle 4740 -prefsLen 26702 -prefMapSize 232675 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77338e8d-83c3-4df1-b947-f0fd8e243296} 2968 "\\.\pipe\gecko-crash-server-pipe.2968" 2596 2809ed58b58 tab
                        3⤵
                          PID:2460
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2968.7.943838410\254670737" -childID 6 -isForBrowser -prefsHandle 5188 -prefMapHandle 5192 -prefsLen 26702 -prefMapSize 232675 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {aacd44fc-86a6-4241-9a27-377cdcef9354} 2968 "\\.\pipe\gecko-crash-server-pipe.2968" 5176 2809f1e3158 tab
                          3⤵
                            PID:3144
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2968.6.970262203\1777935527" -childID 5 -isForBrowser -prefsHandle 2596 -prefMapHandle 4712 -prefsLen 26702 -prefMapSize 232675 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e13edc3d-5e5f-431a-8a29-93fc7064a426} 2968 "\\.\pipe\gecko-crash-server-pipe.2968" 5088 2809ed55e58 tab
                            3⤵
                              PID:1452
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2968.8.1813276464\575062528" -childID 7 -isForBrowser -prefsHandle 4480 -prefMapHandle 4456 -prefsLen 28156 -prefMapSize 232675 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {981620e6-8515-4c41-807b-4c79279dae8a} 2968 "\\.\pipe\gecko-crash-server-pipe.2968" 1232 2809dabb758 tab
                              3⤵
                                PID:708

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\evlzgz75.default-release\activity-stream.discovery_stream.json.tmp

                            Filesize

                            164KB

                            MD5

                            aa41144dc0d2253302a4cb345c19c5f3

                            SHA1

                            def0e4440996037c47de3b2a33fcffdb5d5aedaf

                            SHA256

                            0e4b425081f4b63f6272adf361549b0edf464ded7e38aeae74802999b0c9b4a3

                            SHA512

                            a261f7775dd3b9f5b22129fceb78dd3673153cfb76d946036ff555226bb9f433f7b42f0bd0dd7e2e8df8b42d6ff72d44efaded156f7c9064bea91d0c55698d94

                          • C:\Users\Admin\AppData\Local\Temp\Kyanite_SUTDI\Counter.txt

                            Filesize

                            191B

                            MD5

                            c4a80f76dcdfb09fe5800d650b177363

                            SHA1

                            f929afccf0672ae1a5af8f2c4f79b79ce74df140

                            SHA256

                            08f1730ba563d94a3a05b885770182cce5bdcccfb306a87b10aa94abda4a543c

                            SHA512

                            13decfc358e66edf5f332896aaf7b4fe3962611acccecc6104781ac98163ed493b8499fc3d8b814aa93b348116f76f5711619dc498802167e944219bc647e8b5

                          • C:\Users\Admin\AppData\Local\Temp\Kyanite_SUTDI\Counter.txt

                            Filesize

                            480B

                            MD5

                            6f22a641ce7b39106842a93d99e6718d

                            SHA1

                            6b8c3cea8c938876d5ec6f229f209e32fee7786e

                            SHA256

                            9289981f673a78db0c50ca0139910fd1c47c22b4bf549ca6f690b4959bcd6619

                            SHA512

                            b2c13fad1e6f68a05a49fc40f26fcafc3cb2d6c35b3d36ba81cc79a212ac6f71f0199ce38f1698e350e5734fc1abf91d232251ed1e8ea7032bc280c89fbda782

                          • C:\Users\Admin\AppData\Local\Temp\svchoster.exe

                            Filesize

                            391KB

                            MD5

                            053778713819beab3df309df472787cd

                            SHA1

                            99c7b5827df89b4fafc2b565abed97c58a3c65b8

                            SHA256

                            f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

                            SHA512

                            35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

                          • C:\Users\Admin\AppData\Local\Temp\svchoster.exe

                            Filesize

                            391KB

                            MD5

                            053778713819beab3df309df472787cd

                            SHA1

                            99c7b5827df89b4fafc2b565abed97c58a3c65b8

                            SHA256

                            f999357a17e672e87fbed66d14ba2bebd6fb04e058a1aae0f0fdc49a797f58fe

                            SHA512

                            35a00001c718e36e956f49879e453f18f5d6c66bbc6a3e1aad6d5dd1109904539b173c3cad0009bc021d4513a67ae0003282f7d14b7aecaa20e59a22c6ad0ddb

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            442KB

                            MD5

                            85430baed3398695717b0263807cf97c

                            SHA1

                            fffbee923cea216f50fce5d54219a188a5100f41

                            SHA256

                            a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                            SHA512

                            06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms

                            Filesize

                            5KB

                            MD5

                            62aa230e2dc9716195cdfedc162afc38

                            SHA1

                            541290baece736ddd076d71ac85abd5db51503ea

                            SHA256

                            e7aa622ea0cd32eda37f565120a1df364c6c2de06f5a08c7d719e06ebfe04abd

                            SHA512

                            1fa110ba928a67ca6ce3b9021af86649d10733b0708ff1bba8dea21566c41f30d3c3be96dc6799dc71268f289361b12f839b7104ffa3d78583a0ada1011ae13e

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\broadcast-listeners.json

                            Filesize

                            204B

                            MD5

                            72c95709e1a3b27919e13d28bbe8e8a2

                            SHA1

                            00892decbee63d627057730bfc0c6a4f13099ee4

                            SHA256

                            9cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa

                            SHA512

                            613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\cert9.db

                            Filesize

                            224KB

                            MD5

                            98f645825dab06e12f664f568db99984

                            SHA1

                            34fafd878f80fa5cfd8e32a814b8a8b5b6bc1759

                            SHA256

                            fae42c8cb6a2b16776045ad1830db22896b24d06b9446d23fb414b77e8adf426

                            SHA512

                            15e85d04fa23178e93bd9ddc5d0e34f5b49e968d4c8201b72e38942077ff56c5f7afb51421851b551a3dedf61f01a1a5c52b6d484da51b4b762822be4a7d759f

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.dll

                            Filesize

                            997KB

                            MD5

                            fe3355639648c417e8307c6d051e3e37

                            SHA1

                            f54602d4b4778da21bc97c7238fc66aa68c8ee34

                            SHA256

                            1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                            SHA512

                            8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\gmp-gmpopenh264\1.8.1.1\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            3d33cdc0b3d281e67dd52e14435dd04f

                            SHA1

                            4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                            SHA256

                            f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                            SHA512

                            a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\prefs.js

                            Filesize

                            6KB

                            MD5

                            f843fc3b858888d342076c7199266348

                            SHA1

                            97dea7b7d8486f03cc085ef488fda80fe53515a0

                            SHA256

                            19b6e95d7e0e109333b648d994d42f1f8552467f8f43a4570f84dc5c5e2189a4

                            SHA512

                            9b25cfb2a279bda5827e7d4c3446c75cb5057e7a886e23b7f3eb44d3a2fbb04d19249ff423c821cc41ea7a6d8585fafb0b4f9ae8d54274883250c4a4a1c7c1f7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore-backups\recovery.jsonlz4

                            Filesize

                            1KB

                            MD5

                            afc5e6111bfc92897d11736e6326ca65

                            SHA1

                            a85428ead19c0d70c94f4a4d3616916c4c00f1b5

                            SHA256

                            1dbea2d2a633d811756c0b03a9d66456ad34bbc5e9f77e021dda304552c4fdd0

                            SHA512

                            1c7ab9df0f77926a4672528795cb079c8e8b8f732875859833c03c6308846011e0089f97e34b5473f4df7d0521aa85d22baaa7006fac1979c8973eb62dfb0762

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore-backups\recovery.jsonlz4

                            Filesize

                            1KB

                            MD5

                            8fa479a231868ccf4e9da729f1b06039

                            SHA1

                            cf2e27a1d3fc2b02aee1ccf7db4f6dcdb23ce3e8

                            SHA256

                            3cd3f2f5eafc1fab32dc7a289de99210a686c3ba4d3087a7793dac4674a09aaf

                            SHA512

                            2880e9c599f7c85db40b8c6ae14923f97cfbf673fb4afd4a712f4555d040662957de3d04904798eadab2437c90dfadf6a350be0894d72db270f471b92da460ec

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                            Filesize

                            184KB

                            MD5

                            ea8cf095b773cd771cde4fc68a2dac5e

                            SHA1

                            47f05fbb1383c47fc77d82751f650234b3964eeb

                            SHA256

                            f75c4203e368bfde55e2f8620c37c81849f05743911fd5ba05185435cf46bbe8

                            SHA512

                            50ead29de0e1a644aa8dc41c671fa162b6e4e62a949e1f1d4ab04831bea4aff5c0090166d62e47db329c230bc2589698aef7c8eeaa89d2d57fe3e63299ff7804

                          • memory/3212-129-0x00000000082E0000-0x00000000087DE000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/3212-178-0x0000000005AB0000-0x0000000005AC0000-memory.dmp

                            Filesize

                            64KB

                          • memory/3212-176-0x00000000091C0000-0x0000000009236000-memory.dmp

                            Filesize

                            472KB

                          • memory/3212-120-0x0000000000D10000-0x00000000010E2000-memory.dmp

                            Filesize

                            3.8MB

                          • memory/3212-125-0x00000000071B0000-0x0000000007428000-memory.dmp

                            Filesize

                            2.5MB

                          • memory/3212-124-0x0000000006DF0000-0x00000000071A8000-memory.dmp

                            Filesize

                            3.7MB

                          • memory/3212-123-0x0000000005AB0000-0x0000000005AC0000-memory.dmp

                            Filesize

                            64KB

                          • memory/3212-122-0x00000000058D0000-0x0000000005936000-memory.dmp

                            Filesize

                            408KB

                          • memory/3212-121-0x0000000005970000-0x0000000005A02000-memory.dmp

                            Filesize

                            584KB