Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
c177d70d7e3fd9c9499011cce57cc800.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c177d70d7e3fd9c9499011cce57cc800.exe
Resource
win10v2004-20240226-en
General
-
Target
c177d70d7e3fd9c9499011cce57cc800.exe
-
Size
1.3MB
-
MD5
c177d70d7e3fd9c9499011cce57cc800
-
SHA1
418e8e996d6e2e5e0d58a74276a771492b0e7283
-
SHA256
9e1dd477999ef5e83ef7e238a8c1df3b1b618c1f5cc72a8a98dd4352b06267a5
-
SHA512
2055b5f3ab4376c49f5ab055b09ced4c0bf4a484cd6aae94d1b6bbc9dfecc6e28c9d7c57f97ef64588bc9249e5c7cf25c24acbeb5cf5b02a8e44b022b00c7281
-
SSDEEP
24576:1LF7NWgiaJrPJTLbGi777hcCwJ5sfeKuCdeMj65PJUSJ+QRZKiCoXvHUZC8ur8h9:NthjlpLbGCwJOfrn45prP/0Rur8hfl
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4556-21-0x00000000068E0000-0x000000000699E000-memory.dmp family_stormkitty -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions c177d70d7e3fd9c9499011cce57cc800.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools c177d70d7e3fd9c9499011cce57cc800.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c177d70d7e3fd9c9499011cce57cc800.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c177d70d7e3fd9c9499011cce57cc800.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation c177d70d7e3fd9c9499011cce57cc800.exe -
Executes dropped EXE 1 IoCs
pid Process 212 ctfmom.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c177d70d7e3fd9c9499011cce57cc800.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 c177d70d7e3fd9c9499011cce57cc800.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3052 set thread context of 4556 3052 c177d70d7e3fd9c9499011cce57cc800.exe 106 PID 4556 set thread context of 2592 4556 c177d70d7e3fd9c9499011cce57cc800.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 212 ctfmom.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2592 MSBuild.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3052 wrote to memory of 4556 3052 c177d70d7e3fd9c9499011cce57cc800.exe 106 PID 3052 wrote to memory of 4556 3052 c177d70d7e3fd9c9499011cce57cc800.exe 106 PID 3052 wrote to memory of 4556 3052 c177d70d7e3fd9c9499011cce57cc800.exe 106 PID 3052 wrote to memory of 4556 3052 c177d70d7e3fd9c9499011cce57cc800.exe 106 PID 3052 wrote to memory of 4556 3052 c177d70d7e3fd9c9499011cce57cc800.exe 106 PID 3052 wrote to memory of 4556 3052 c177d70d7e3fd9c9499011cce57cc800.exe 106 PID 3052 wrote to memory of 4556 3052 c177d70d7e3fd9c9499011cce57cc800.exe 106 PID 3052 wrote to memory of 4556 3052 c177d70d7e3fd9c9499011cce57cc800.exe 106 PID 4556 wrote to memory of 2592 4556 c177d70d7e3fd9c9499011cce57cc800.exe 108 PID 4556 wrote to memory of 2592 4556 c177d70d7e3fd9c9499011cce57cc800.exe 108 PID 4556 wrote to memory of 2592 4556 c177d70d7e3fd9c9499011cce57cc800.exe 108 PID 4556 wrote to memory of 2592 4556 c177d70d7e3fd9c9499011cce57cc800.exe 108 PID 4556 wrote to memory of 2592 4556 c177d70d7e3fd9c9499011cce57cc800.exe 108 PID 4556 wrote to memory of 2592 4556 c177d70d7e3fd9c9499011cce57cc800.exe 108 PID 4556 wrote to memory of 2592 4556 c177d70d7e3fd9c9499011cce57cc800.exe 108 PID 4556 wrote to memory of 2592 4556 c177d70d7e3fd9c9499011cce57cc800.exe 108 PID 4556 wrote to memory of 212 4556 c177d70d7e3fd9c9499011cce57cc800.exe 109 PID 4556 wrote to memory of 212 4556 c177d70d7e3fd9c9499011cce57cc800.exe 109 PID 4556 wrote to memory of 212 4556 c177d70d7e3fd9c9499011cce57cc800.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\c177d70d7e3fd9c9499011cce57cc800.exe"C:\Users\Admin\AppData\Local\Temp\c177d70d7e3fd9c9499011cce57cc800.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\c177d70d7e3fd9c9499011cce57cc800.exe"{path}"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\ctfmom.exe"C:\Users\Admin\AppData\Roaming\Microsoft\ctfmom.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:212
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1356 --field-trial-handle=3136,i,3192284747741020952,1225278682167953346,262144 --variations-seed-version /prefetch:81⤵PID:2312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c177d70d7e3fd9c9499011cce57cc800.exe.log
Filesize1KB
MD5e08f822522c617a40840c62e4b0fb45e
SHA1ae516dca4da5234be6676d3f234c19ec55725be7
SHA256bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7
SHA512894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4
-
Filesize
42KB
MD5998d4888b99734c60802f93fb2daf940
SHA1297a395d096ca67b885134dea1147c270b402c1a
SHA256d63c4166014d50c6321e82e1c6de7c1a2207b0e09f541d1275d0109aa1d191b5
SHA5122658aab48807606dc83c4b822438b5454a3df19f4db015d30b8b330baab6218a8a259bb33a2e57398e3c6823059ea49477b4d79df63fe383a9f4725359899190