Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 19:38
Behavioral task
behavioral1
Sample
20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe
Resource
win10v2004-20240412-en
General
-
Target
20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe
-
Size
162KB
-
MD5
48f3578add712ad477de43a61079f6e2
-
SHA1
4b6a625d66abee564bc3fc0a4927ebceab88a0e7
-
SHA256
20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b
-
SHA512
e9d7e06a61e187538313c0935b05ce453afd77f9c04046112818c2044ae6a66c6bb5b2c3aaf88eadeedda2648b2162dce5171eea9e7e2b4fb0dc1b0fe1f5b149
-
SSDEEP
3072:qeIM6syPKcys1v6LCNrhwBafeQt0siX7mIBbVaibI+wARE+WpC5:V6syicyst6LCwAfeJlr1xvb1
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp family_stormkitty -
Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL -
Detects executables (downlaoders) containing URLs to raw contents of a paste 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawPaste_URL -
Detects executables containing URLs to raw contents of a Github gist 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables referencing Discord tokens regular expressions 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_Discord_Regex -
Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing credit card regular expressions 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_CC_Regex -
Detects executables referencing many VPN software clients. Observed in infosteslers 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_VPN -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables using Telegram Chat Bot 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_TelegramChatBot -
Detects executables with interest in wireless interface using netsh 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_WirelessNetReccon -
Detects file containing reversed ASEP Autorun registry keys 1 IoCs
resource yara_rule behavioral2/memory/2520-0-0x0000000000460000-0x000000000048E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 8 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\a4c6399717db92ed687fc897f834ecd1\Admin@QUBJEIMO_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Camera Roll\desktop.ini 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe File created C:\Users\Admin\AppData\Local\a4c6399717db92ed687fc897f834ecd1\Admin@QUBJEIMO_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\Saved Pictures\desktop.ini 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe File created C:\Users\Admin\AppData\Local\a4c6399717db92ed687fc897f834ecd1\Admin@QUBJEIMO_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe File opened for modification C:\Users\Admin\AppData\Local\a4c6399717db92ed687fc897f834ecd1\Admin@QUBJEIMO_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe File created C:\Users\Admin\AppData\Local\a4c6399717db92ed687fc897f834ecd1\Admin@QUBJEIMO_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe File created C:\Users\Admin\AppData\Local\a4c6399717db92ed687fc897f834ecd1\Admin@QUBJEIMO_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe File opened for modification C:\Users\Admin\AppData\Local\a4c6399717db92ed687fc897f834ecd1\Admin@QUBJEIMO_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe File created C:\Users\Admin\AppData\Local\a4c6399717db92ed687fc897f834ecd1\Admin@QUBJEIMO_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 36 pastebin.com 37 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4936 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 92 PID 2520 wrote to memory of 4936 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 92 PID 2520 wrote to memory of 4936 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 92 PID 4936 wrote to memory of 1688 4936 cmd.exe 94 PID 4936 wrote to memory of 1688 4936 cmd.exe 94 PID 4936 wrote to memory of 1688 4936 cmd.exe 94 PID 4936 wrote to memory of 3660 4936 cmd.exe 95 PID 4936 wrote to memory of 3660 4936 cmd.exe 95 PID 4936 wrote to memory of 3660 4936 cmd.exe 95 PID 4936 wrote to memory of 2812 4936 cmd.exe 96 PID 4936 wrote to memory of 2812 4936 cmd.exe 96 PID 4936 wrote to memory of 2812 4936 cmd.exe 96 PID 2520 wrote to memory of 3960 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 97 PID 2520 wrote to memory of 3960 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 97 PID 2520 wrote to memory of 3960 2520 20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe 97 PID 3960 wrote to memory of 4188 3960 cmd.exe 99 PID 3960 wrote to memory of 4188 3960 cmd.exe 99 PID 3960 wrote to memory of 4188 3960 cmd.exe 99 PID 3960 wrote to memory of 1912 3960 cmd.exe 100 PID 3960 wrote to memory of 1912 3960 cmd.exe 100 PID 3960 wrote to memory of 1912 3960 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe"C:\Users\Admin\AppData\Local\Temp\20209b1782561498aae9640d8032d3663636c0f10a094dd1b69f413097d7c41b.exe"1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:1688
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵PID:3660
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:4188
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵PID:1912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\a4c6399717db92ed687fc897f834ecd1\Admin@QUBJEIMO_en-US\System\Process.txt
Filesize4KB
MD56e52b88f490871e325b130b65f871520
SHA100fd7fc1d74ce29748be7b9905a7f85b841e1525
SHA256542c926bad300697ba39519291dd4f79cd11960b715d7bab30e160a7db49c5bf
SHA51295788620169540091f79bc15b8e5f866b9a63384f83cf40169f75768848b190f76a8f08d7abff6632278e7b2c97e32f2df4bb9c168815fd8ac77b7605a41bcaa
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99