Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-08-2024 15:09

General

  • Target

    BEST NEW RAID TOOL/iamupdate1.exe

  • Size

    75KB

  • MD5

    43326a9c0df39473916c94e38ebe0465

  • SHA1

    9f7bfdc8ec9e02afe54f4a973d0d16122ed6e027

  • SHA256

    2a223700ae3377c565cdfec3ba5e309e88d138d8371bb6aadad632f22dd88dc3

  • SHA512

    7fa3800126ea2334fc55c92c82883c1d160a87163995d240f6da1ea5ba4f0e25549183af4da965647534bb186006c39e34d9578af614b1d5e22916fbb486ed9e

  • SSDEEP

    1536:uBdK/BtATyQmRWpPKH+HZW/emPnIJwPUIVembD076qTNmJn:uBGtATrpPKH+HwrPI+DcmbDejJ8n

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 4 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BEST NEW RAID TOOL\iamupdate1.exe
    "C:\Users\Admin\AppData\Local\Temp\BEST NEW RAID TOOL\iamupdate1.exe"
    1⤵
    • Adds Run key to start application
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1472
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:1040
        • C:\Windows\system32\findstr.exe
          findstr All
          3⤵
            PID:3748
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show profile name=65001 key=clear | findstr Key
          2⤵
          • System Network Configuration Discovery: Wi-Fi Discovery
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Windows\system32\chcp.com
            chcp 65001
            3⤵
              PID:4420
            • C:\Windows\system32\netsh.exe
              netsh wlan show profile name=65001 key=clear
              3⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Network Configuration Discovery: Wi-Fi Discovery
              PID:4204
            • C:\Windows\system32\findstr.exe
              findstr Key
              3⤵
                PID:2076

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/332-0-0x00007FFF55243000-0x00007FFF55245000-memory.dmp

            Filesize

            8KB

          • memory/332-1-0x0000000000790000-0x00000000007AA000-memory.dmp

            Filesize

            104KB

          • memory/332-2-0x000000001B480000-0x000000001B48A000-memory.dmp

            Filesize

            40KB

          • memory/332-3-0x000000001B8D0000-0x000000001B8EA000-memory.dmp

            Filesize

            104KB

          • memory/332-4-0x00007FFF55240000-0x00007FFF55D02000-memory.dmp

            Filesize

            10.8MB

          • memory/332-13-0x0000000002A10000-0x0000000002A22000-memory.dmp

            Filesize

            72KB

          • memory/332-14-0x000000001BD20000-0x000000001BD5C000-memory.dmp

            Filesize

            240KB

          • memory/332-18-0x00007FFF55240000-0x00007FFF55D02000-memory.dmp

            Filesize

            10.8MB