Analysis

  • max time kernel
    435s
  • max time network
    443s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-08-2023 05:05

General

  • Target

    Tool Reg Gmail/Tool Reg Gmail.exe

  • Size

    2.9MB

  • MD5

    9bb4f8efcb4bd9f775cbf2bb124b52fa

  • SHA1

    293c86f7c01b2112acd8f501eb6bece4261c0c68

  • SHA256

    fbcad70631d25c84ce0248aff8f3c3754c9b6f44bc95e159477373dcd0244c40

  • SHA512

    7d5b92476685053d2ee690d09b548580ec828803eebd1863706bd93235ff94f2281bcfb16fb36ec8725220370377892e342f9948727de8b8a9b405029705cf0a

  • SSDEEP

    49152:yJCdNYoYW4IETrsgUvu9N8ivdKDhA+WsPP6QmUTftIsmNm/5XhG34AiROr2J3Y2D:yJYYVrsk9N8ivyhAdsPSQxgU11lwr2Jh

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tool Reg Gmail\Tool Reg Gmail.exe
    "C:\Users\Admin\AppData\Local\Temp\Tool Reg Gmail\Tool Reg Gmail.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\MSXGLQPS_Admin\Logs.txt

    Filesize

    790B

    MD5

    8c3af6e1c1e75a4f484c8205d5883005

    SHA1

    98ea42763c93b9db2f5bf630bd6de525ee4a37c5

    SHA256

    7eb78aab80df28d1f507391781f4d1dd9d8547cc31738e60ec2f0d641c88372c

    SHA512

    adb5ff8634e47caeb357023849e4ac4ff136adda5de8f720bafefc1d19593c726eb97ce9be240c53ec59c2c6dcb1ff564c0b0b69ef382c2065a163f6dcf1aaed

  • memory/3384-136-0x0000000005950000-0x00000000059E2000-memory.dmp

    Filesize

    584KB

  • memory/3384-134-0x0000000074400000-0x0000000074BB0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-133-0x0000000000BF0000-0x0000000000EE6000-memory.dmp

    Filesize

    3.0MB

  • memory/3384-137-0x0000000006200000-0x00000000067A4000-memory.dmp

    Filesize

    5.6MB

  • memory/3384-138-0x00000000059F0000-0x0000000005A56000-memory.dmp

    Filesize

    408KB

  • memory/3384-139-0x00000000058A0000-0x00000000058B0000-memory.dmp

    Filesize

    64KB

  • memory/3384-143-0x0000000007F50000-0x0000000007F8C000-memory.dmp

    Filesize

    240KB

  • memory/3384-149-0x0000000008C00000-0x0000000008C76000-memory.dmp

    Filesize

    472KB

  • memory/3384-135-0x0000000005A80000-0x0000000005C42000-memory.dmp

    Filesize

    1.8MB

  • memory/3384-168-0x0000000008BC0000-0x0000000008BE2000-memory.dmp

    Filesize

    136KB

  • memory/3384-169-0x0000000074400000-0x0000000074BB0000-memory.dmp

    Filesize

    7.7MB

  • memory/3384-170-0x00000000058A0000-0x00000000058B0000-memory.dmp

    Filesize

    64KB