Analysis
-
max time kernel
290s -
max time network
298s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
31/05/2024, 04:12
Behavioral task
behavioral1
Sample
System.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
System.exe
Resource
win7-20240215-en
Behavioral task
behavioral3
Sample
System.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
System.exe
Resource
win10v2004-20240426-en
General
-
Target
System.exe
-
Size
3.4MB
-
MD5
fb19368b80bb083a67bea154f2e7f4a6
-
SHA1
7bb20b8ee40c9f94dd77b8cd35920b1ba651ae86
-
SHA256
92ab9ed68950db61024eb5c5180f0019281a3bec96cd5a2f7305f450de064d4f
-
SHA512
9fc041c4404602469314cf29cdae55d720bb26e8b37d774b13f7483a160c7fd0daea8d6274e7113a2c524630bf90d3b04513d04e19fe3f9cb216b44502f7c4f2
-
SSDEEP
49152:OnT6jNyvZdHzYjd3deChH/GBtNNwxry+3u1IRgQo37xcoMuFVhDb5Xqx:fQZdHod3ACBGBX+HgQvwV56x
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.5
Default
umldzqgmsvrmiibib
-
c2_url_file
https://paste.fo/raw/53957c5e1888
-
delay
1
-
install
true
-
install_file
Registry.exe
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/1608-27-0x0000000007E90000-0x0000000007FB2000-memory.dmp family_stormkitty -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ System.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion System.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion System.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1608-11-0x00000000001F0000-0x0000000000B10000-memory.dmp themida behavioral1/memory/1608-12-0x00000000001F0000-0x0000000000B10000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA System.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1608 System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1456 1608 WerFault.exe 72 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe 1608 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1608 System.exe Token: SeDebugPrivilege 1608 System.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1608 System.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1608 wrote to memory of 4716 1608 System.exe 73 PID 1608 wrote to memory of 4716 1608 System.exe 73 PID 1608 wrote to memory of 4716 1608 System.exe 73 PID 4716 wrote to memory of 320 4716 cmd.exe 75 PID 4716 wrote to memory of 320 4716 cmd.exe 75 PID 4716 wrote to memory of 320 4716 cmd.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\System.exe"C:\Users\Admin\AppData\Local\Temp\System.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Registry" /tr '"C:\Users\Admin\AppData\Roaming\Registry.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Registry" /tr '"C:\Users\Admin\AppData\Roaming\Registry.exe"'3⤵
- Creates scheduled task(s)
PID:320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 29442⤵
- Program crash
PID:1456
-