Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 13:07
Static task
static1
Behavioral task
behavioral1
Sample
5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe
Resource
win10v2004-20230703-en
General
-
Target
5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe
-
Size
205KB
-
MD5
31503bd1455f4dc0288263ecbc7af2d4
-
SHA1
ac35a7aa76f1b8c9be148f2a835adb12295125ce
-
SHA256
5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56
-
SHA512
0dc1124cf9b6189e43a4cddd9045e2f13845e6d935fd72faee52331fc070c0a979a66657df0332c91850e620bdf368bab0d33561fc6051055b1597ad2a7e0f5a
-
SSDEEP
3072:ayEdA7fMpvQVOl3uutPT8ahmHwbQ6rLr4UEW4FP1y86vLabNCdRQav3Iyc2Ab8Fs:a23UTLhmQs6rlEWApqLaUdRrPAbin4
Malware Config
Extracted
blustealer
https://api.telegram.org/bot6055609563:AAEfBlANuysNS3Feagncr0tioVRR2TOueCY/sendMessage?chat_id=6188873948
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral1/memory/2604-72-0x0000000000090000-0x00000000000AA000-memory.dmp family_stormkitty behavioral1/memory/2604-74-0x0000000000090000-0x00000000000AA000-memory.dmp family_stormkitty behavioral1/memory/2604-76-0x0000000000090000-0x00000000000AA000-memory.dmp family_stormkitty -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1708 set thread context of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 2220 set thread context of 2604 2220 Caspol.exe 29 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2604 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 Caspol.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 1708 wrote to memory of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 1708 wrote to memory of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 1708 wrote to memory of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 1708 wrote to memory of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 1708 wrote to memory of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 1708 wrote to memory of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 1708 wrote to memory of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 1708 wrote to memory of 2220 1708 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 28 PID 2220 wrote to memory of 2604 2220 Caspol.exe 29 PID 2220 wrote to memory of 2604 2220 Caspol.exe 29 PID 2220 wrote to memory of 2604 2220 Caspol.exe 29 PID 2220 wrote to memory of 2604 2220 Caspol.exe 29 PID 2220 wrote to memory of 2604 2220 Caspol.exe 29 PID 2220 wrote to memory of 2604 2220 Caspol.exe 29 PID 2220 wrote to memory of 2604 2220 Caspol.exe 29 PID 2220 wrote to memory of 2604 2220 Caspol.exe 29 PID 2220 wrote to memory of 2604 2220 Caspol.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe"C:\Users\Admin\AppData\Local\Temp\5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-