Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 13:07
Static task
static1
Behavioral task
behavioral1
Sample
5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe
Resource
win10v2004-20230703-en
General
-
Target
5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe
-
Size
205KB
-
MD5
31503bd1455f4dc0288263ecbc7af2d4
-
SHA1
ac35a7aa76f1b8c9be148f2a835adb12295125ce
-
SHA256
5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56
-
SHA512
0dc1124cf9b6189e43a4cddd9045e2f13845e6d935fd72faee52331fc070c0a979a66657df0332c91850e620bdf368bab0d33561fc6051055b1597ad2a7e0f5a
-
SSDEEP
3072:ayEdA7fMpvQVOl3uutPT8ahmHwbQ6rLr4UEW4FP1y86vLabNCdRQav3Iyc2Ab8Fs:a23UTLhmQs6rlEWApqLaUdRrPAbin4
Malware Config
Extracted
blustealer
https://api.telegram.org/bot6055609563:AAEfBlANuysNS3Feagncr0tioVRR2TOueCY/sendMessage?chat_id=6188873948
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/3300-141-0x0000000000720000-0x000000000073A000-memory.dmp family_stormkitty -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3532 set thread context of 2648 3532 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 83 PID 2648 set thread context of 3300 2648 Caspol.exe 84 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3300 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2648 Caspol.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2648 3532 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 83 PID 3532 wrote to memory of 2648 3532 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 83 PID 3532 wrote to memory of 2648 3532 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 83 PID 3532 wrote to memory of 2648 3532 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 83 PID 3532 wrote to memory of 2648 3532 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 83 PID 3532 wrote to memory of 2648 3532 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 83 PID 3532 wrote to memory of 2648 3532 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 83 PID 3532 wrote to memory of 2648 3532 5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe 83 PID 2648 wrote to memory of 3300 2648 Caspol.exe 84 PID 2648 wrote to memory of 3300 2648 Caspol.exe 84 PID 2648 wrote to memory of 3300 2648 Caspol.exe 84 PID 2648 wrote to memory of 3300 2648 Caspol.exe 84 PID 2648 wrote to memory of 3300 2648 Caspol.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe"C:\Users\Admin\AppData\Local\Temp\5afb4e6a861525cd433a70e5249c5a85573b4282f1b292e175f4737ba13eff56.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-