Analysis
-
max time kernel
172s -
max time network
145s -
platform
windows11-21h2_x64 -
resource
win11-20231129-en -
resource tags
arch:x64arch:x86image:win11-20231129-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-12-2023 22:13
Behavioral task
behavioral1
Sample
ALL PC GAME HACK.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ALL PC GAME HACK.exe
Resource
win10-20231020-en
Behavioral task
behavioral3
Sample
ALL PC GAME HACK.exe
Resource
win10v2004-20231127-en
General
-
Target
ALL PC GAME HACK.exe
-
Size
170KB
-
MD5
338b9b7d7bd920ad7f4037f6e5e28354
-
SHA1
954850a55b45734e081ba042a80091ef8a8a736b
-
SHA256
9f24c318ca0ba27a2bfb9294b126273817befcf53eff93bcef2024a554bb2775
-
SHA512
3973e61c65b1b5ae2460f69bd3e5c18167f6f9d96463f1cd60801f15a62a143ecdc5e572270af397e9070594d6552559259daf8d36f7fffeb49a13427280b013
-
SSDEEP
3072:r3ST4aYp5zZb2faAaVZUwq4LTTSiSNqIPuMi9bxJ2cmty+Wpx:baozZQ7aVOQTSFNXPji9bf
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6428436791:AAHUeqTcF4RyQiYJbx3HCWyLufD99p-06s0/sendMessage?chat_id=6119438547
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
Processes:
resource yara_rule behavioral4/memory/1728-0-0x00000000000D0000-0x0000000000100000-memory.dmp family_stormkitty behavioral4/memory/1728-2-0x0000000004C20000-0x0000000004C30000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral4/memory/1728-0-0x00000000000D0000-0x0000000000100000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
Processes:
ALL PC GAME HACK.exedescription ioc process File created C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini ALL PC GAME HACK.exe File opened for modification C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini ALL PC GAME HACK.exe File created C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini ALL PC GAME HACK.exe File created C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini ALL PC GAME HACK.exe File created C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini ALL PC GAME HACK.exe File created C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini ALL PC GAME HACK.exe File created C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini ALL PC GAME HACK.exe File opened for modification C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini ALL PC GAME HACK.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ALL PC GAME HACK.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 ALL PC GAME HACK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ALL PC GAME HACK.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
ALL PC GAME HACK.exepid process 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe 1728 ALL PC GAME HACK.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ALL PC GAME HACK.exedescription pid process Token: SeDebugPrivilege 1728 ALL PC GAME HACK.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
ALL PC GAME HACK.execmd.execmd.exedescription pid process target process PID 1728 wrote to memory of 1468 1728 ALL PC GAME HACK.exe cmd.exe PID 1728 wrote to memory of 1468 1728 ALL PC GAME HACK.exe cmd.exe PID 1728 wrote to memory of 1468 1728 ALL PC GAME HACK.exe cmd.exe PID 1468 wrote to memory of 2548 1468 cmd.exe chcp.com PID 1468 wrote to memory of 2548 1468 cmd.exe chcp.com PID 1468 wrote to memory of 2548 1468 cmd.exe chcp.com PID 1468 wrote to memory of 2508 1468 cmd.exe netsh.exe PID 1468 wrote to memory of 2508 1468 cmd.exe netsh.exe PID 1468 wrote to memory of 2508 1468 cmd.exe netsh.exe PID 1468 wrote to memory of 1064 1468 cmd.exe findstr.exe PID 1468 wrote to memory of 1064 1468 cmd.exe findstr.exe PID 1468 wrote to memory of 1064 1468 cmd.exe findstr.exe PID 1728 wrote to memory of 2288 1728 ALL PC GAME HACK.exe cmd.exe PID 1728 wrote to memory of 2288 1728 ALL PC GAME HACK.exe cmd.exe PID 1728 wrote to memory of 2288 1728 ALL PC GAME HACK.exe cmd.exe PID 2288 wrote to memory of 4616 2288 cmd.exe chcp.com PID 2288 wrote to memory of 4616 2288 cmd.exe chcp.com PID 2288 wrote to memory of 4616 2288 cmd.exe chcp.com PID 2288 wrote to memory of 1984 2288 cmd.exe netsh.exe PID 2288 wrote to memory of 1984 2288 cmd.exe netsh.exe PID 2288 wrote to memory of 1984 2288 cmd.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ALL PC GAME HACK.exe"C:\Users\Admin\AppData\Local\Temp\ALL PC GAME HACK.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2548
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:2508
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:4616
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\Browsers\Firefox\Bookmarks.txt
Filesize105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
C:\Users\Admin\AppData\Local\b860248abcf25d2efba19f759e3dcadf\Admin@ABHVVWZS_en-US\System\Process.txt
Filesize4KB
MD524597f2a3b5c27d76fb397c058247d8d
SHA1b89ee976dc7575a2ceb68388fb8caee5c9724c1b
SHA256c84cfec2219bee9898adbf9478e52a5c54ab3da0390b0cff353c946ea27f1e31
SHA512d84843e89af42ecce8a2241d483a3f416135829dc336fb6d5111e1b3cf0fb330f64a8950a697b892ecc9645a0d1ad653378cf9fcc75e36ab573a3c55681c9d1e
-
Filesize
6B
MD550c25416cd81e22ea32960a8b83b3455
SHA1fe5d58ac895e6eaa1ed2441d3fadc036139889e6
SHA256d4ba46fef1a4bf857550b31030058a0560d72ce6d974a6be325fb5eea9af8996
SHA5120f58fb87688942dafb915f0c8132809b7eed0a5a2a5e33583ff7e5ff1c428ad31f661048c7a1bdc53971f1c93715c1fde759a31e727757cde2a91ef263f2f8b2