Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
DiscordMulty.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DiscordMulty.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DiscordMulty/DRouter.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
DiscordMulty/DRouter.exe
Resource
win10v2004-20240802-en
General
-
Target
DiscordMulty/DRouter.exe
-
Size
1.9MB
-
MD5
4d978f4a830f374b5867f1ae53b08ffc
-
SHA1
827b301d630a037a6559acc3b63612fded885767
-
SHA256
a881c67a5ad97fed46616a1c219a4c70fffcbe3ec1f0c900747e2ba75131b143
-
SHA512
f9339c421b5a8ee85358d0a4384ef3d203cb68572152f02c9610c4c371091d5c5caed5fde3a3c379ef3feaa2c86cc123e09596fb8862816ea60ae2d78d6a6091
-
SSDEEP
3072:gq6+ouCpk2mpcWJ0r+QNTBfqcm2GvaDE:gldk1cWQRNTBS
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral3/memory/2892-26-0x00000000022E0000-0x000000000239E000-memory.dmp family_stormkitty -
Executes dropped EXE 1 IoCs
pid Process 1740 ctfmom.exe -
Loads dropped DLL 1 IoCs
pid Process 2892 websocket4.pif -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3064 set thread context of 2892 3064 websocket4.pif 36 PID 2892 set thread context of 2636 2892 websocket4.pif 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2188 2092 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language websocket4.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DRouter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language websocket4.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language webhttp.pif -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1740 ctfmom.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
pid Process 3064 websocket4.pif 2092 webhttp.pif -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2636 MSBuild.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2016 2460 DRouter.exe 30 PID 2460 wrote to memory of 2016 2460 DRouter.exe 30 PID 2460 wrote to memory of 2016 2460 DRouter.exe 30 PID 2460 wrote to memory of 2016 2460 DRouter.exe 30 PID 2016 wrote to memory of 3064 2016 cmd.exe 32 PID 2016 wrote to memory of 3064 2016 cmd.exe 32 PID 2016 wrote to memory of 3064 2016 cmd.exe 32 PID 2016 wrote to memory of 3064 2016 cmd.exe 32 PID 2016 wrote to memory of 2092 2016 cmd.exe 33 PID 2016 wrote to memory of 2092 2016 cmd.exe 33 PID 2016 wrote to memory of 2092 2016 cmd.exe 33 PID 2016 wrote to memory of 2092 2016 cmd.exe 33 PID 2092 wrote to memory of 2188 2092 webhttp.pif 35 PID 2092 wrote to memory of 2188 2092 webhttp.pif 35 PID 2092 wrote to memory of 2188 2092 webhttp.pif 35 PID 2092 wrote to memory of 2188 2092 webhttp.pif 35 PID 3064 wrote to memory of 2892 3064 websocket4.pif 36 PID 3064 wrote to memory of 2892 3064 websocket4.pif 36 PID 3064 wrote to memory of 2892 3064 websocket4.pif 36 PID 3064 wrote to memory of 2892 3064 websocket4.pif 36 PID 3064 wrote to memory of 2892 3064 websocket4.pif 36 PID 3064 wrote to memory of 2892 3064 websocket4.pif 36 PID 3064 wrote to memory of 2892 3064 websocket4.pif 36 PID 3064 wrote to memory of 2892 3064 websocket4.pif 36 PID 3064 wrote to memory of 2892 3064 websocket4.pif 36 PID 2892 wrote to memory of 2636 2892 websocket4.pif 37 PID 2892 wrote to memory of 2636 2892 websocket4.pif 37 PID 2892 wrote to memory of 2636 2892 websocket4.pif 37 PID 2892 wrote to memory of 2636 2892 websocket4.pif 37 PID 2892 wrote to memory of 2636 2892 websocket4.pif 37 PID 2892 wrote to memory of 2636 2892 websocket4.pif 37 PID 2892 wrote to memory of 2636 2892 websocket4.pif 37 PID 2892 wrote to memory of 2636 2892 websocket4.pif 37 PID 2892 wrote to memory of 2636 2892 websocket4.pif 37 PID 2892 wrote to memory of 1740 2892 websocket4.pif 38 PID 2892 wrote to memory of 1740 2892 websocket4.pif 38 PID 2892 wrote to memory of 1740 2892 websocket4.pif 38 PID 2892 wrote to memory of 1740 2892 websocket4.pif 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\DiscordMulty\DRouter.exe"C:\Users\Admin\AppData\Local\Temp\DiscordMulty\DRouter.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\FE7B.tmp\FE7C.tmp\FE7D.bat C:\Users\Admin\AppData\Local\Temp\DiscordMulty\DRouter.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\DiscordMulty\lib\websocket4.piflib\websocket4.pif3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\DiscordMulty\lib\websocket4.pif"{path}"4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\ctfmom.exe"C:\Users\Admin\AppData\Roaming\Microsoft\ctfmom.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:1740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DiscordMulty\lib\webhttp.piflib\webhttp.pif3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 5524⤵
- Program crash
PID:2188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5a86dfd2e60123849d7dc67d6d2dc3a95
SHA1fb87bf06e3d34e2dcaf4c89cf9098a8ce6548460
SHA256e762f92531bc407f4fc7c443a0474343b8d7669e9756fb4fce50593bd0833d78
SHA5124c858c8cc23ef46186d9a153603fec3b56501c24a0c77b39f457bf4cd8626cc5f78afc041bd1135f96796c7d130f0c5ae336bc8a35df96cd06135eaa6e20b4af
-
Filesize
42KB
MD5998d4888b99734c60802f93fb2daf940
SHA1297a395d096ca67b885134dea1147c270b402c1a
SHA256d63c4166014d50c6321e82e1c6de7c1a2207b0e09f541d1275d0109aa1d191b5
SHA5122658aab48807606dc83c4b822438b5454a3df19f4db015d30b8b330baab6218a8a259bb33a2e57398e3c6823059ea49477b4d79df63fe383a9f4725359899190