Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 17:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
OC 13065.exe
Resource
win7-20240220-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
OC 13065.exe
Resource
win10v2004-20240611-en
8 signatures
150 seconds
General
-
Target
OC 13065.exe
-
Size
1.8MB
-
MD5
26a81e6b9da7801ca3bd29c4b4d6b76c
-
SHA1
50e5cb8380bbc9f11f3b5bcd477c86f3b4ac6263
-
SHA256
f8850f3a39201ecea1e5bc30c07dad691e1b8db1a1eaeada7ed3d859e69a630e
-
SHA512
1a671f454bc48e108a831e9e1a2231a56cfcc0ee5c73c6f523d9764c75d256e32c070492a5d562250d64439422cd5658503afa00f69fc75e317e4193103854a8
-
SSDEEP
6144:Rx1iwfMPTymGeIHp58TY4adHganYLP3GAr0fSTSZlzOtvw9rI6HDCFixI+JAn3wk:b1Xd6T6qWArcSGZlgvw9rImCF+I93wk
Score
10/10
Malware Config
Extracted
Family
xworm
Version
5.0
C2
185.29.11.111:7000
Mutex
B3bYPcOfuxE4gqjQ
Attributes
-
install_file
USB.exe
aes.plain
Signatures
-
Detect Xworm Payload 5 IoCs
resource yara_rule behavioral1/memory/2476-9-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2476-8-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2476-11-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2476-13-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm behavioral1/memory/2476-15-0x0000000000400000-0x000000000040E000-memory.dmp family_xworm -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2476-22-0x0000000006340000-0x0000000006460000-memory.dmp family_stormkitty -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2036 set thread context of 2476 2036 OC 13065.exe 29 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2036 OC 13065.exe Token: SeDebugPrivilege 2476 CasPol.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2476 2036 OC 13065.exe 29 PID 2036 wrote to memory of 2476 2036 OC 13065.exe 29 PID 2036 wrote to memory of 2476 2036 OC 13065.exe 29 PID 2036 wrote to memory of 2476 2036 OC 13065.exe 29 PID 2036 wrote to memory of 2476 2036 OC 13065.exe 29 PID 2036 wrote to memory of 2476 2036 OC 13065.exe 29 PID 2036 wrote to memory of 2476 2036 OC 13065.exe 29 PID 2036 wrote to memory of 2476 2036 OC 13065.exe 29 PID 2036 wrote to memory of 2476 2036 OC 13065.exe 29 PID 2036 wrote to memory of 2580 2036 OC 13065.exe 30 PID 2036 wrote to memory of 2580 2036 OC 13065.exe 30 PID 2036 wrote to memory of 2580 2036 OC 13065.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\OC 13065.exe"C:\Users\Admin\AppData\Local\Temp\OC 13065.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2036 -s 6162⤵PID:2580
-