Overview
overview
10Static
static
10BlitzedGra...12.exe
windows7-x64
10BlitzedGra...12.exe
windows10-2004-x64
10BlitzedGra...OR.dll
windows7-x64
1BlitzedGra...OR.dll
windows10-2004-x64
1BlitzedGra...to.dll
windows7-x64
1BlitzedGra...to.dll
windows10-2004-x64
1BlitzedGra...on.dll
windows7-x64
1BlitzedGra...on.dll
windows10-2004-x64
1BlitzedGra...le.exe
windows7-x64
3BlitzedGra...le.exe
windows10-2004-x64
3BlitzedGra...ww.exe
windows7-x64
10BlitzedGra...ww.exe
windows10-2004-x64
10BlitzedGra...y5.exe
windows7-x64
10BlitzedGra...y5.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 11:15
Behavioral task
behavioral1
Sample
BlitzedGrabberV12/BlitzedGrabberV12.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
BlitzedGrabberV12/BlitzedGrabberV12.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
BlitzedGrabberV12/Resources/APIFOR.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
BlitzedGrabberV12/Resources/APIFOR.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
BlitzedGrabberV12/Resources/BouncyCastle.Crypto.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
BlitzedGrabberV12/Resources/BouncyCastle.Crypto.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
BlitzedGrabberV12/Resources/Newtonsoft.Json.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
BlitzedGrabberV12/Resources/Newtonsoft.Json.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
BlitzedGrabberV12/Resources/UltraEmbeddable.exe
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
BlitzedGrabberV12/Resources/UltraEmbeddable.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
BlitzedGrabberV12/Resources/ww.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
BlitzedGrabberV12/Resources/ww.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
BlitzedGrabberV12/Resources/yhyty5.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
BlitzedGrabberV12/Resources/yhyty5.exe
Resource
win10v2004-20240419-en
General
-
Target
BlitzedGrabberV12/Resources/yhyty5.exe
-
Size
59KB
-
MD5
9b1283f4b90fa0009ea6fda13596a584
-
SHA1
1daa7ccfddc6da823c2fadb7b821a9e26efebabe
-
SHA256
4e3ff2595fc8b32fb44856e856b6d91600fd6a66ab556bc2437a926bf7c8fdb0
-
SHA512
ca6d46254da5c16f80a3ee4a5d11b7203a025082e8268ba8ff343a6b705262e03c8c149e381ec038b364ebecb8a5ab4169e6e5fb3676d90abe37aecf468d1ecb
-
SSDEEP
768:uvlq4ltFkHOCROyDZSCY6LaIdB4b2iuAPGdX3oI0fZOv11cEL6N9Q5WEpGl:I84l4XROyDL3AEo41BLg9Qg6y
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral14/memory/2928-0-0x0000000000240000-0x0000000000256000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 25 discord.com 26 discord.com 29 discord.com 30 discord.com 32 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2928 yhyty5.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2928 wrote to memory of 4416 2928 yhyty5.exe 90 PID 2928 wrote to memory of 4416 2928 yhyty5.exe 90 PID 4416 wrote to memory of 4692 4416 cmd.exe 92 PID 4416 wrote to memory of 4692 4416 cmd.exe 92 PID 4416 wrote to memory of 5000 4416 cmd.exe 93 PID 4416 wrote to memory of 5000 4416 cmd.exe 93 PID 4416 wrote to memory of 4920 4416 cmd.exe 94 PID 4416 wrote to memory of 4920 4416 cmd.exe 94 PID 2928 wrote to memory of 4900 2928 yhyty5.exe 95 PID 2928 wrote to memory of 4900 2928 yhyty5.exe 95 PID 4900 wrote to memory of 4112 4900 cmd.exe 97 PID 4900 wrote to memory of 4112 4900 cmd.exe 97 PID 4900 wrote to memory of 948 4900 cmd.exe 98 PID 4900 wrote to memory of 948 4900 cmd.exe 98 PID 4900 wrote to memory of 4720 4900 cmd.exe 99 PID 4900 wrote to memory of 4720 4900 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12\Resources\yhyty5.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12\Resources\yhyty5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4692
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵PID:5000
-
-
C:\Windows\system32\findstr.exefindstr All3⤵PID:4920
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile name=65001 key=clear | findstr Key2⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:4112
-
-
C:\Windows\system32\netsh.exenetsh wlan show profile name=65001 key=clear3⤵PID:948
-
-
C:\Windows\system32\findstr.exefindstr Key3⤵PID:4720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD568b329da9893e34099c7d8ad5cb9c940
SHA1adc83b19e793491b1c6ea0fd8b46cd9f32e592fc
SHA25601ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
SHA512be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09