Analysis

  • max time kernel
    118s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02-07-2024 01:10

General

  • Target

    ad8efa26c7c870b002d627f88fd1f22c2d398e87f2a6104d368953385530ae58.exe

  • Size

    232KB

  • MD5

    3bb8fb0d40b5535cf7675b6689df20f3

  • SHA1

    7117979d998ca9086f2a2033363d825339aa666d

  • SHA256

    ad8efa26c7c870b002d627f88fd1f22c2d398e87f2a6104d368953385530ae58

  • SHA512

    5c5e7d4f415b5385359b2371a61fdc59a55a60c9434f37e45279281a68bf0fb7ae6c830b446914c76f67d12d90c0b833e498574e5a3dbebe9b3ee38e4b64c4aa

  • SSDEEP

    6144:FMyNsfjEFOUFOEnrfL3m1itUbcyEAmg+T:FMH6XZLyEAmDT

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad8efa26c7c870b002d627f88fd1f22c2d398e87f2a6104d368953385530ae58.exe
    "C:\Users\Admin\AppData\Local\Temp\ad8efa26c7c870b002d627f88fd1f22c2d398e87f2a6104d368953385530ae58.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Windows\system32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2848
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          PID:1340
        • C:\Windows\system32\findstr.exe
          findstr All
          3⤵
            PID:2280
        • C:\Windows\system32\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1516
          • C:\Windows\system32\chcp.com
            chcp 65001
            3⤵
              PID:2752
            • C:\Windows\system32\netsh.exe
              netsh wlan show networks mode=bssid
              3⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:2776
        • C:\Windows\system32\msiexec.exe
          C:\Windows\system32\msiexec.exe /V
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1088

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\4e4194bf792b11fcee1c8b62e46231db\Admin@SCFGBRBT_en-US\Browsers\Firefox\Bookmarks.txt

          Filesize

          105B

          MD5

          2e9d094dda5cdc3ce6519f75943a4ff4

          SHA1

          5d989b4ac8b699781681fe75ed9ef98191a5096c

          SHA256

          c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

          SHA512

          d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

        • C:\Users\Admin\AppData\Local\4e4194bf792b11fcee1c8b62e46231db\Admin@SCFGBRBT_en-US\System\Apps.txt

          Filesize

          6KB

          MD5

          41cd827edadbcf3f676580c580c1dc03

          SHA1

          4e99509e7dc0b1ed6cc5306241b58b2ccbc8948b

          SHA256

          1d270899f548088968bebea9d32c8c0f23dfe59ff6e61ccc3b38d995cf001389

          SHA512

          087c36e68cfd5bc6898859a194ef1b63156bff6b5cd59f872dd6d48e281b558f2d7aa46a934c4da902315b361bee8cbe1b993525b4f5783e455944a55da89d0b

        • C:\Users\Admin\AppData\Local\4e4194bf792b11fcee1c8b62e46231db\Admin@SCFGBRBT_en-US\System\Process.txt

          Filesize

          677B

          MD5

          49d5468d6911ae063af03e934dabeb09

          SHA1

          7ff9ca74df83368c2952aef8e11569707bfb244a

          SHA256

          b1f4a1cfa116725b97eda7eed12e03cdc18d84ec6379ad214d8ac4bba93eddca

          SHA512

          4dddc1fee58b2c0ccd27b5ccc1022d6d72bb9df6810bb28ccb31f1b0cea80eb13951bb6419bea099b5d481ba9556438fcfffe47783f22fb81e72c62c371b68cd

        • C:\Users\Admin\AppData\Local\Temp\StormKitty-Latest.log

          Filesize

          14KB

          MD5

          4a99b64c01ed0b6a4b0f64baeb104369

          SHA1

          ecd2703b41781d3247c6bfe2e9317d669c1c9bbf

          SHA256

          5fdf704d0a3eab008cef143c64fdb8934ba1e9f6a5251c961bd3705ccfc36757

          SHA512

          d7d6e47288c61cf39130e41a0867277999ee67d28d61b4c45cb707f3b53cfb2ef069d86f04d3f7228665a2ba295044693d5b0f44baa7f7322787389cee48727b

        • memory/2344-0-0x000007FEF56E3000-0x000007FEF56E4000-memory.dmp

          Filesize

          4KB

        • memory/2344-1-0x00000000000C0000-0x0000000000100000-memory.dmp

          Filesize

          256KB

        • memory/2344-2-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp

          Filesize

          9.9MB

        • memory/2344-73-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp

          Filesize

          9.9MB

        • memory/2344-153-0x000007FEF56E3000-0x000007FEF56E4000-memory.dmp

          Filesize

          4KB

        • memory/2344-154-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp

          Filesize

          9.9MB

        • memory/2344-155-0x000007FEF56E0000-0x000007FEF60CC000-memory.dmp

          Filesize

          9.9MB