Analysis
-
max time kernel
34s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2023, 17:59
Behavioral task
behavioral1
Sample
instagram 0day.exe
Resource
win7-20230831-en
General
-
Target
instagram 0day.exe
-
Size
170KB
-
MD5
4d2538cac244ad3f315436c6fbe2f12f
-
SHA1
67b671bcda3c13e7b085378f7dfc766fe15bec18
-
SHA256
163b9785fdeb5b8e317e5d651e2e3bccf244f864921574dc4c73281389cbce82
-
SHA512
46170ad6b178cc61a5b6dd07eccfc4f2d5e379eb97266289f85e3b07fb85ea12e08104a42ca7af7bdc3065862b5f482039342d5dbe8b9eb8c06ad7ff8f87fbdd
-
SSDEEP
3072:++STW8djpN6izj8mZwdJqutB+YDpqIPu/i9bVK2cwtEL6+Wp7:j8XN6W8mmHPtppXPSi9b44E
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot5636417446:AAGa4gvWAKcDCv7f9c8u42_399xKPfEkUlQ/sendMessage?chat_id=5331885311
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4168-0-0x00000000005C0000-0x00000000005F0000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4168-0-0x00000000005C0000-0x00000000005F0000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini instagram 0day.exe File created C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini instagram 0day.exe File created C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini instagram 0day.exe File opened for modification C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini instagram 0day.exe File opened for modification C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini instagram 0day.exe File created C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini instagram 0day.exe File created C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini instagram 0day.exe File created C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini instagram 0day.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 instagram 0day.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier instagram 0day.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe 4168 instagram 0day.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4168 instagram 0day.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4168 wrote to memory of 1476 4168 instagram 0day.exe 89 PID 4168 wrote to memory of 1476 4168 instagram 0day.exe 89 PID 4168 wrote to memory of 1476 4168 instagram 0day.exe 89 PID 1476 wrote to memory of 3960 1476 cmd.exe 91 PID 1476 wrote to memory of 3960 1476 cmd.exe 91 PID 1476 wrote to memory of 3960 1476 cmd.exe 91 PID 1476 wrote to memory of 2080 1476 cmd.exe 92 PID 1476 wrote to memory of 2080 1476 cmd.exe 92 PID 1476 wrote to memory of 2080 1476 cmd.exe 92 PID 1476 wrote to memory of 4892 1476 cmd.exe 93 PID 1476 wrote to memory of 4892 1476 cmd.exe 93 PID 1476 wrote to memory of 4892 1476 cmd.exe 93 PID 4168 wrote to memory of 4416 4168 instagram 0day.exe 95 PID 4168 wrote to memory of 4416 4168 instagram 0day.exe 95 PID 4168 wrote to memory of 4416 4168 instagram 0day.exe 95 PID 4416 wrote to memory of 1676 4416 cmd.exe 97 PID 4416 wrote to memory of 1676 4416 cmd.exe 97 PID 4416 wrote to memory of 1676 4416 cmd.exe 97 PID 4416 wrote to memory of 2104 4416 cmd.exe 98 PID 4416 wrote to memory of 2104 4416 cmd.exe 98 PID 4416 wrote to memory of 2104 4416 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\instagram 0day.exe"C:\Users\Admin\AppData\Local\Temp\instagram 0day.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3960
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:2080
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:4892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1676
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:2104
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\9f5fe481cdc5273791d9990601bca11c\Admin@NVYNMMTR_en-US\System\Process.txt
Filesize4KB
MD595b5d51322c037b60b5f335d52cf2c48
SHA18e45858ed9b7961570a3d8dbb8a7e92efee3c89b
SHA256af5abd1aa34714478b43e991755ac132ce7bd351889b848d7e16953c260d86f1
SHA5128717bdde10affa1500c23a56656bcb615237f8d34be8f1f07356568331656d3157831818c0988e9a57e67ee5e1aff0a882b0baa671f197857a882835faf60ea1
-
Filesize
5B
MD5d41e2a728f38a9616dab93f5c99a3940
SHA1a6ec8811406f50384cff7890f126a425ca465072
SHA2563770cb5540de45f78a1e3c0e9191016382a719b71521140434f73cd3a5b6a0da
SHA5129b82f10e787ec2b0e5b83adbdbe41d8e0036814153231cdf39704ba6011b2104d324387ce3791240ddb72f125f044517a4c7bd770bbefa35bfb8c96f3fa18340