Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2023, 14:22
Behavioral task
behavioral1
Sample
76.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
76.exe
Resource
win10v2004-20230703-en
General
-
Target
76.exe
-
Size
309KB
-
MD5
7676d190a2a572a61972464293c7ba38
-
SHA1
9b5b992e855d4139d7b074149a68b05b04eca27c
-
SHA256
5b45d82c1bdeb0b5b91c84cd61c0359f95440e2a02ccc46258e76d4f4f679030
-
SHA512
4321be10b5da54380f5abd2f21e81f6d481f7cf0b09f55c92b24eecc6272ca59fbe47fedca806417efed37169c94ff80eb72fa3454a568f268fc81fa5ed6fd16
-
SSDEEP
6144:J1jCUYVklKf/STDbILwh4seUp3Op3kfgZzjXLOEDfvMs/clN:J1jH1lKf/STAUh1j+pS2fXiEDvXG
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4252-136-0x00000000007A0000-0x00000000007F0000-memory.dmp family_stormkitty -
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x000200000001e6d9-150.dat vmprotect behavioral2/memory/4252-389-0x000000001C5F0000-0x000000001C674000-memory.dmp vmprotect behavioral2/files/0x000200000001e6d9-408.dat vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 icanhazip.com 30 ip-api.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2516 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2588 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe 4252 76.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4252 76.exe Token: SeSecurityPrivilege 4696 msiexec.exe Token: SeDebugPrivilege 2588 taskkill.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4252 wrote to memory of 2088 4252 76.exe 90 PID 4252 wrote to memory of 2088 4252 76.exe 90 PID 2088 wrote to memory of 2828 2088 cmd.exe 93 PID 2088 wrote to memory of 2828 2088 cmd.exe 93 PID 2088 wrote to memory of 1972 2088 cmd.exe 94 PID 2088 wrote to memory of 1972 2088 cmd.exe 94 PID 2088 wrote to memory of 3372 2088 cmd.exe 95 PID 2088 wrote to memory of 3372 2088 cmd.exe 95 PID 4252 wrote to memory of 3584 4252 76.exe 99 PID 4252 wrote to memory of 3584 4252 76.exe 99 PID 3584 wrote to memory of 1540 3584 cmd.exe 101 PID 3584 wrote to memory of 1540 3584 cmd.exe 101 PID 3584 wrote to memory of 3468 3584 cmd.exe 102 PID 3584 wrote to memory of 3468 3584 cmd.exe 102 PID 4252 wrote to memory of 4116 4252 76.exe 107 PID 4252 wrote to memory of 4116 4252 76.exe 107 PID 4116 wrote to memory of 3100 4116 cmd.exe 109 PID 4116 wrote to memory of 3100 4116 cmd.exe 109 PID 4116 wrote to memory of 2588 4116 cmd.exe 110 PID 4116 wrote to memory of 2588 4116 cmd.exe 110 PID 4116 wrote to memory of 2516 4116 cmd.exe 111 PID 4116 wrote to memory of 2516 4116 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\76.exe"C:\Users\Admin\AppData\Local\Temp\76.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2828
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:1972
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:3372
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1540
-
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid3⤵PID:3468
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpEE8F.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3100
-
-
C:\Windows\system32\taskkill.exeTaskKill /F /IM 42523⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\system32\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2516
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\Directories\OneDrive.txt
Filesize25B
MD5966247eb3ee749e21597d73c4176bd52
SHA11e9e63c2872cef8f015d4b888eb9f81b00a35c79
SHA2568ddfc481b1b6ae30815ecce8a73755862f24b3bb7fdebdbf099e037d53eb082e
SHA512bd30aec68c070e86e3dec787ed26dd3d6b7d33d83e43cb2d50f9e2cff779fee4c96afbbe170443bd62874073a844beb29a69b10c72c54d7d444a8d86cfd7b5aa
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\Directories\Startup.txt
Filesize24B
MD568c93da4981d591704cea7b71cebfb97
SHA1fd0f8d97463cd33892cc828b4ad04e03fc014fa6
SHA256889ed51f9c16a4b989bda57957d3e132b1a9c117ee84e208207f2fa208a59483
SHA51263455c726b55f2d4de87147a75ff04f2daa35278183969ccf185d23707840dd84363bec20d4e8c56252196ce555001ca0e61b3f4887d27577081fdef9e946402
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\Directories\Videos.txt
Filesize23B
MD51fddbf1169b6c75898b86e7e24bc7c1f
SHA1d2091060cb5191ff70eb99c0088c182e80c20f8c
SHA256a67aa329b7d878de61671e18cd2f4b011d11cbac67ea779818c6dafad2d70733
SHA51220bfeafde7fec1753fef59de467bd4a3dd7fe627e8c44e95fe62b065a5768c4508e886ec5d898e911a28cf6365f455c9ab1ebe2386d17a76f53037f99061fd4d
-
Filesize
1KB
MD5feafd8f8f9cecbc0ee4605ed96e10ec3
SHA196535eb7b7079be39f2005947d397edc4f38f1fb
SHA2561248f83c40aeaff5f6db6b8ea17efa83f0846d021ed78e35959eebff5ff639e8
SHA512c6ddb7fc91c455927004d6a8f75b449edf716c72aba2dec0b23518f198a9d00dd21b21f70c64ea849384c78c4de5b13f9427679a37a4324d6df76746baaa22a9
-
Filesize
4KB
MD54a5d9b755120cfb5b71165e768d3e8a2
SHA129d793d7b31e1113cf1d5806560baf3bcf7c0dcd
SHA2563e6572738251de0cd6cb629597f820a46a6a630dbe03034f54d7e22525aa81d2
SHA5122e02e2a854ea226ad3da204c494c953f50768d8ea5718a61b88d7d4ecf5048db2ac481a81edd2f60cf80146bc341012cf7a64a081621fc1ffc2537fe47c851b1
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt
Filesize908B
MD5cb22eac9a4b28edbf9e108065ef57b15
SHA1245fdb51013147d018ec4da81d991a2418fbb21e
SHA256ab90382d1a0523faf164e337a15afe3bdfc4441ab0e56b3bc35e02aa44363144
SHA512f953ec9ac8ad8cba733396aa163d939b7ad592ad2e9dfc342cfacf6436b7674f5fad7640edcbe60d62cf6204019d849f7e2776d400dbd33d70cce7c6b3f96e96
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt
Filesize1KB
MD5bcbbb76dccce69834fac2aef91896af9
SHA1a1b899ccb289da5ef1d58b92b3f67df61be8301e
SHA25655ff96d783f318e50c3d692022faf8953ac822c47844eb99f6817f45dd46675b
SHA512dcd9869ccc8b9a543212e6fa58555ba3a71240ed9d57db14d353dab684dd7373b5f3bd6355a728c302a582eef7ac9bf6fc7e17d780cbe7e440b150ac13ff6358
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt
Filesize2KB
MD52d730f695e32a1e80953286ae488ed71
SHA18045e4664f4d722b4fbaa2debc13f2e5a4f5bd6f
SHA25609453f0dbbc29d50778862ff5f6ceaa58fbf3eaae35cc9a3201d7453b765dbd2
SHA51262456b92530452da1f7f8cc15651212b78af4755da1981bd0811a0ad302109800057fff790b713ffba590816dc313bb7f4c5a5efc17f7fbb1e5a3692aed4dae6
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt
Filesize3KB
MD5bb16b7a383b220725240f98aace13a1d
SHA156af4b06cb261d713ad62e87cb58dc459d22ea6f
SHA256b1435cb473db91cfe4bbfa3670fa43c81b933b25420a501df23a017fca7d4ec0
SHA512b12f7cabb6ce43115a81f6b8cd4c318d05f55c65cb4efcb49b1c084a1c3b09d5a284f81bf64049053d637ac151b387499118667a3031138f229927d0ff57777f
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\Process.txt
Filesize4KB
MD5dcc5d6ac936832b116b7b738fcf7e7b9
SHA17363967efb947679557eef8f962c9b5b57347327
SHA25626bfeaf3314383dca3937c098d26511f4812af6240ac2a62ea65743e0e2feaeb
SHA5125879dfafd7645e17226baf453ed03a954918a6bbdf0e9266800f56b6a0520c195407d9eabca4f7569d444f2c4df5660e67319d6e6a0452981c3e4f83504fd650
-
C:\Users\Admin\AppData\Local\6fd7c00cffaed80cb28cb179aca83cf4\Admin@LMMMEQUO_en-US\System\ProductKey.txt
Filesize29B
MD571eb5479298c7afc6d126fa04d2a9bde
SHA1a9b3d5505cf9f84bb6c2be2acece53cb40075113
SHA256f6cadfd4e4c25ff3b8cffe54a2af24a757a349abbf4e1142ec4c9789347fe8b3
SHA5127c6687e21d31ec1d6d2eff04b07b465f875fd80df26677f1506b14158444cf55044eb6674880bd5bd44f04ff73023b26cb19b8837427a1d6655c96df52f140bd
-
Filesize
2B
MD5c0c7c76d30bd3dcaefc96f40275bdc0a
SHA1e1822db470e60d090affd0956d743cb0e7cdf113
SHA2561a6562590ef19d1045d06c4055742d38288e9e6dcd71ccde5cee80f1d5a774eb
SHA512e62b01e8497ab6b7d89432599e21804eca278bb4a9c4b6ef5f7bae00bd5e45ae6c8cf3a18b74296f9a8e69cd2f416a8f41eeb2128f4e280ecf438ffef6244e14
-
Filesize
293KB
MD57a2d5deab61f043394a510f4e2c0866f
SHA1ca16110c9cf6522cd7bea32895fd0f697442849b
SHA25675db945388f62f2de3d3eaae911f49495f289244e2fec9b25455c2d686989f69
SHA512b66b0bf227762348a5ede3c2578d5bc089c222f632a705241bcc63d56620bef238c67ca2bd400ba7874b2bc168e279673b0e105b73282bc69aa21a7fd34bafe0
-
Filesize
293KB
MD57a2d5deab61f043394a510f4e2c0866f
SHA1ca16110c9cf6522cd7bea32895fd0f697442849b
SHA25675db945388f62f2de3d3eaae911f49495f289244e2fec9b25455c2d686989f69
SHA512b66b0bf227762348a5ede3c2578d5bc089c222f632a705241bcc63d56620bef238c67ca2bd400ba7874b2bc168e279673b0e105b73282bc69aa21a7fd34bafe0
-
Filesize
448KB
MD56d1c62ec1c2ef722f49b2d8dd4a4df16
SHA11bb08a979b7987bc7736a8cfa4779383cb0ecfa6
SHA25600da1597d92235d3f84da979e2fa5dbf049bafb52c33bd6fc8ee7b29570c124c
SHA512c0dce8eaa52eb6c319d4be2eec4622bb3380c65b659cfb77ff51a4ada7d3e591e791ee823dad67b5556ffac5c060ff45d09dd1cc21baaf70ba89806647cb3bd2
-
Filesize
448KB
MD56d1c62ec1c2ef722f49b2d8dd4a4df16
SHA11bb08a979b7987bc7736a8cfa4779383cb0ecfa6
SHA25600da1597d92235d3f84da979e2fa5dbf049bafb52c33bd6fc8ee7b29570c124c
SHA512c0dce8eaa52eb6c319d4be2eec4622bb3380c65b659cfb77ff51a4ada7d3e591e791ee823dad67b5556ffac5c060ff45d09dd1cc21baaf70ba89806647cb3bd2
-
Filesize
231B
MD5fa0685d8fbea7420e4672c4be4a2965b
SHA180dff22db7229ab645319484c70b528b4ad5ddc7
SHA25687ce4e31284590a00201c3c1869d87fe918538aaff8f52674ac9f56672034195
SHA5126c738624418d0c4f0fa51d837100c6a7788ab60c49d95010ea3b2f000e9bb7cc8762468abbd38a0fd5ecd8a48e29a5755f28cae46db67a5835a81f7fac488654