Analysis

  • max time kernel
    145s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2023, 14:22

General

  • Target

    76.exe

  • Size

    309KB

  • MD5

    7676d190a2a572a61972464293c7ba38

  • SHA1

    9b5b992e855d4139d7b074149a68b05b04eca27c

  • SHA256

    5b45d82c1bdeb0b5b91c84cd61c0359f95440e2a02ccc46258e76d4f4f679030

  • SHA512

    4321be10b5da54380f5abd2f21e81f6d481f7cf0b09f55c92b24eecc6272ca59fbe47fedca806417efed37169c94ff80eb72fa3454a568f268fc81fa5ed6fd16

  • SSDEEP

    6144:J1jCUYVklKf/STDbILwh4seUp3Op3kfgZzjXLOEDfvMs/clN:J1jH1lKf/STAUh1j+pS2fXiEDvXG

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76.exe
    "C:\Users\Admin\AppData\Local\Temp\76.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4252
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2828
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
            PID:1972
          • C:\Windows\system32\findstr.exe
            findstr All
            3⤵
              PID:3372
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3584
            • C:\Windows\system32\chcp.com
              chcp 65001
              3⤵
                PID:1540
              • C:\Windows\system32\netsh.exe
                netsh wlan show networks mode=bssid
                3⤵
                  PID:3468
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpEE8F.tmp.bat
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4116
                • C:\Windows\system32\chcp.com
                  chcp 65001
                  3⤵
                    PID:3100
                  • C:\Windows\system32\taskkill.exe
                    TaskKill /F /IM 4252
                    3⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2588
                  • C:\Windows\system32\timeout.exe
                    Timeout /T 2 /Nobreak
                    3⤵
                    • Delays execution with timeout.exe
                    PID:2516
              • C:\Windows\system32\msiexec.exe
                C:\Windows\system32\msiexec.exe /V
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4696

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\Browsers\Firefox\Bookmarks.txt

                Filesize

                105B

                MD5

                2e9d094dda5cdc3ce6519f75943a4ff4

                SHA1

                5d989b4ac8b699781681fe75ed9ef98191a5096c

                SHA256

                c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

                SHA512

                d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\Directories\OneDrive.txt

                Filesize

                25B

                MD5

                966247eb3ee749e21597d73c4176bd52

                SHA1

                1e9e63c2872cef8f015d4b888eb9f81b00a35c79

                SHA256

                8ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e

                SHA512

                bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\Directories\Startup.txt

                Filesize

                24B

                MD5

                68c93da4981d591704cea7b71cebfb97

                SHA1

                fd0f8d97463cd33892cc828b4ad04e03fc014fa6

                SHA256

                889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483

                SHA512

                63455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\Directories\Videos.txt

                Filesize

                23B

                MD5

                1fddbf1169b6c75898b86e7e24bc7c1f

                SHA1

                d2091060cb5191ff70eb99c0088c182e80c20f8c

                SHA256

                a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733

                SHA512

                20bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Apps.txt

                Filesize

                1KB

                MD5

                feafd8f8f9cecbc0ee4605ed96e10ec3

                SHA1

                96535eb7b7079be39f2005947d397edc4f38f1fb

                SHA256

                1248f83c40aeaff5f6db6b8ea17efa83f0846d021ed78e35959eebff5ff639e8

                SHA512

                c6ddb7fc91c455927004d6a8f75b449edf716c72aba2dec0b23518f198a9d00dd21b21f70c64ea849384c78c4de5b13f9427679a37a4324d6df76746baaa22a9

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Apps.txt

                Filesize

                4KB

                MD5

                4a5d9b755120cfb5b71165e768d3e8a2

                SHA1

                29d793d7b31e1113cf1d5806560baf3bcf7c0dcd

                SHA256

                3e6572738251de0cd6cb629597f820a46a6a630dbe03034f54d7e22525aa81d2

                SHA512

                2e02e2a854ea226ad3da204c494c953f50768d8ea5718a61b88d7d4ecf5048db2ac481a81edd2f60cf80146bc341012cf7a64a081621fc1ffc2537fe47c851b1

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt

                Filesize

                908B

                MD5

                cb22eac9a4b28edbf9e108065ef57b15

                SHA1

                245fdb51013147d018ec4da81d991a2418fbb21e

                SHA256

                ab90382d1a0523faf164e337a15afe3bdfc4441ab0e56b3bc35e02aa44363144

                SHA512

                f953ec9ac8ad8cba733396aa163d939b7ad592ad2e9dfc342cfacf6436b7674f5fad7640edcbe60d62cf6204019d849f7e2776d400dbd33d70cce7c6b3f96e96

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt

                Filesize

                1KB

                MD5

                bcbbb76dccce69834fac2aef91896af9

                SHA1

                a1b899ccb289da5ef1d58b92b3f67df61be8301e

                SHA256

                55ff96d783f318e50c3d692022faf8953ac822c47844eb99f6817f45dd46675b

                SHA512

                dcd9869ccc8b9a543212e6fa58555ba3a71240ed9d57db14d353dab684dd7373b5f3bd6355a728c302a582eef7ac9bf6fc7e17d780cbe7e440b150ac13ff6358

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt

                Filesize

                2KB

                MD5

                2d730f695e32a1e80953286ae488ed71

                SHA1

                8045e4664f4d722b4fbaa2debc13f2e5a4f5bd6f

                SHA256

                09453f0dbbc29d50778862ff5f6ceaa58fbf3eaae35cc9a3201d7453b765dbd2

                SHA512

                62456b92530452da1f7f8cc15651212b78af4755da1981bd0811a0ad302109800057fff790b713ffba590816dc313bb7f4c5a5efc17f7fbb1e5a3692aed4dae6

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt

                Filesize

                3KB

                MD5

                bb16b7a383b220725240f98aace13a1d

                SHA1

                56af4b06cb261d713ad62e87cb58dc459d22ea6f

                SHA256

                b1435cb473db91cfe4bbfa3670fa43c81b933b25420a501df23a017fca7d4ec0

                SHA512

                b12f7cabb6ce43115a81f6b8cd4c318d05f55c65cb4efcb49b1c084a1c3b09d5a284f81bf64049053d637ac151b387499118667a3031138f229927d0ff57777f

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt

                Filesize

                4KB

                MD5

                dcc5d6ac936832b116b7b738fcf7e7b9

                SHA1

                7363967efb947679557eef8f962c9b5b57347327

                SHA256

                26bfeaf3314383dca3937c098d26511f4812af6240ac2a62ea65743e0e2feaeb

                SHA512

                5879dfafd7645e17226baf453ed03a954918a6bbdf0e9266800f56b6a0520c195407d9eabca4f7569d444f2c4df5660e67319d6e6a0452981c3e4f83504fd650

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\ProductKey.txt

                Filesize

                29B

                MD5

                71eb5479298c7afc6d126fa04d2a9bde

                SHA1

                a9b3d5505cf9f84bb6c2be2acece53cb40075113

                SHA256

                f6cadfd4e4c25ff3b8cffe54a2af24a757a349abbf4e1142ec4c9789347fe8b3

                SHA512

                7c6687e21d31ec1d6d2eff04b07b465f875fd80df26677f1506b14158444cf55044eb6674880bd5bd44f04ff73023b26cb19b8837427a1d6655c96df52f140bd

              • C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\msgid.dat

                Filesize

                2B

                MD5

                c0c7c76d30bd3dcaefc96f40275bdc0a

                SHA1

                e1822db470e60d090affd0956d743cb0e7cdf113

                SHA256

                1a6562590ef19d1045d06c4055742d38288e9e6dcd71ccde5cee80f1d5a774eb

                SHA512

                e62b01e8497ab6b7d89432599e21804eca278bb4a9c4b6ef5f7bae00bd5e45ae6c8cf3a18b74296f9a8e69cd2f416a8f41eeb2128f4e280ecf438ffef6244e14

              • C:\Users\Admin\AppData\Local\Temp\AnonFileApi.dll

                Filesize

                293KB

                MD5

                7a2d5deab61f043394a510f4e2c0866f

                SHA1

                ca16110c9cf6522cd7bea32895fd0f697442849b

                SHA256

                75db945388f62f2de3d3eaae911f49495f289244e2fec9b25455c2d686989f69

                SHA512

                b66b0bf227762348a5ede3c2578d5bc089c222f632a705241bcc63d56620bef238c67ca2bd400ba7874b2bc168e279673b0e105b73282bc69aa21a7fd34bafe0

              • C:\Users\Admin\AppData\Local\Temp\AnonFileApi.dll

                Filesize

                293KB

                MD5

                7a2d5deab61f043394a510f4e2c0866f

                SHA1

                ca16110c9cf6522cd7bea32895fd0f697442849b

                SHA256

                75db945388f62f2de3d3eaae911f49495f289244e2fec9b25455c2d686989f69

                SHA512

                b66b0bf227762348a5ede3c2578d5bc089c222f632a705241bcc63d56620bef238c67ca2bd400ba7874b2bc168e279673b0e105b73282bc69aa21a7fd34bafe0

              • C:\Users\Admin\AppData\Local\Temp\DotNetZip.dll

                Filesize

                448KB

                MD5

                6d1c62ec1c2ef722f49b2d8dd4a4df16

                SHA1

                1bb08a979b7987bc7736a8cfa4779383cb0ecfa6

                SHA256

                00da1597d92235d3f84da979e2fa5dbf049bafb52c33bd6fc8ee7b29570c124c

                SHA512

                c0dce8eaa52eb6c319d4be2eec4622bb3380c65b659cfb77ff51a4ada7d3e591e791ee823dad67b5556ffac5c060ff45d09dd1cc21baaf70ba89806647cb3bd2

              • C:\Users\Admin\AppData\Local\Temp\DotNetZip.dll

                Filesize

                448KB

                MD5

                6d1c62ec1c2ef722f49b2d8dd4a4df16

                SHA1

                1bb08a979b7987bc7736a8cfa4779383cb0ecfa6

                SHA256

                00da1597d92235d3f84da979e2fa5dbf049bafb52c33bd6fc8ee7b29570c124c

                SHA512

                c0dce8eaa52eb6c319d4be2eec4622bb3380c65b659cfb77ff51a4ada7d3e591e791ee823dad67b5556ffac5c060ff45d09dd1cc21baaf70ba89806647cb3bd2

              • C:\Users\Admin\AppData\Local\Temp\tmpEE8F.tmp.bat

                Filesize

                231B

                MD5

                fa0685d8fbea7420e4672c4be4a2965b

                SHA1

                80dff22db7229ab645319484c70b528b4ad5ddc7

                SHA256

                87ce4e31284590a00201c3c1869d87fe918538aaff8f52674ac9f56672034195

                SHA512

                6c738624418d0c4f0fa51d837100c6a7788ab60c49d95010ea3b2f000e9bb7cc8762468abbd38a0fd5ecd8a48e29a5755f28cae46db67a5835a81f7fac488654

              • memory/4252-321-0x000000001C570000-0x000000001C5E6000-memory.dmp

                Filesize

                472KB

              • memory/4252-136-0x00000000007A0000-0x00000000007F0000-memory.dmp

                Filesize

                320KB

              • memory/4252-294-0x000000001C560000-0x000000001C570000-memory.dmp

                Filesize

                64KB

              • memory/4252-389-0x000000001C5F0000-0x000000001C674000-memory.dmp

                Filesize

                528KB

              • memory/4252-391-0x0000000001600000-0x0000000001601000-memory.dmp

                Filesize

                4KB

              • memory/4252-392-0x0000000001600000-0x0000000001601000-memory.dmp

                Filesize

                4KB

              • memory/4252-393-0x0000000001600000-0x0000000001601000-memory.dmp

                Filesize

                4KB

              • memory/4252-395-0x000000001C560000-0x000000001C570000-memory.dmp

                Filesize

                64KB

              • memory/4252-396-0x000000001C560000-0x000000001C570000-memory.dmp

                Filesize

                64KB

              • memory/4252-397-0x0000000001600000-0x0000000001601000-memory.dmp

                Filesize

                4KB

              • memory/4252-140-0x000000001C560000-0x000000001C570000-memory.dmp

                Filesize

                64KB

              • memory/4252-139-0x00007FFE123A0000-0x00007FFE12E61000-memory.dmp

                Filesize

                10.8MB

              • memory/4252-406-0x00007FFE123A0000-0x00007FFE12E61000-memory.dmp

                Filesize

                10.8MB

              • memory/4252-138-0x000000001C560000-0x000000001C570000-memory.dmp

                Filesize

                64KB

              • memory/4252-137-0x00007FFE123A0000-0x00007FFE12E61000-memory.dmp

                Filesize

                10.8MB