Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 19:23
Behavioral task
behavioral1
Sample
ProtectPass.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
ProtectPass.exe
Resource
win11-20240802-en
General
-
Target
ProtectPass.exe
-
Size
320KB
-
MD5
d91ce8584e3ea4ab871df46a5691ad55
-
SHA1
1a8d835fc8b40731181b71a230837d71fc183e2f
-
SHA256
75bc18011ab2a39bdd97e241ee748399fa0fdf7fbd51a640abe5067cee34abcc
-
SHA512
2db75e9d2833a7bd086548f59cf1abc264b7a499382e09e343fa101b953fb390f64ff605e6cdc19423009332bc7cce4a6871f99c6404e6c49e7ecc5c337974ab
-
SSDEEP
6144:3m/Q1Q5Ng68j/svmHC40+XIzFUygWK0tWrcBOvN:3m/Q6P8j/svm1TXI5tZB
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4284-1-0x0000000000D90000-0x0000000000DE6000-memory.dmp family_stormkitty -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
ProtectPass.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ProtectPass.exe Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ProtectPass.exe Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ProtectPass.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
Processes:
ProtectPass.exedescription ioc process File created C:\Users\Admin\AppData\Local\OARDHGDN\FileGrabber\Desktop\desktop.ini ProtectPass.exe File created C:\Users\Admin\AppData\Local\OARDHGDN\FileGrabber\Documents\desktop.ini ProtectPass.exe File created C:\Users\Admin\AppData\Local\OARDHGDN\FileGrabber\Downloads\desktop.ini ProtectPass.exe File created C:\Users\Admin\AppData\Local\OARDHGDN\FileGrabber\Pictures\desktop.ini ProtectPass.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 45 api.ipify.org 46 api.ipify.org 47 ip-api.com 6 freegeoip.app 13 freegeoip.app -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ProtectPass.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ProtectPass.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ProtectPass.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 ProtectPass.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier ProtectPass.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
ProtectPass.exepid process 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe 4284 ProtectPass.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ProtectPass.exedescription pid process Token: SeDebugPrivilege 4284 ProtectPass.exe -
outlook_office_path 1 IoCs
Processes:
ProtectPass.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ProtectPass.exe -
outlook_win_path 1 IoCs
Processes:
ProtectPass.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ProtectPass.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ProtectPass.exe"C:\Users\Admin\AppData\Local\Temp\ProtectPass.exe"1⤵
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4284
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
551KB
MD51291734e8db998d3a9581370320efd6c
SHA1e3655d42aca84d9e562e484978f62854576e927d
SHA256a1cc1a8934c153e53ba42dbfd03bd1fe1c079ceea780f40d441c19889a3ff859
SHA512404b1ef78325c658b207990b37ecd228031ea24031b1dd030ed06afe03543464ec942c0b8848a59bff25625eb341696bad645be90ca98f9b8c59230f4f2fee75
-
Filesize
374KB
MD51e3400d6a285c7046b0286e873bbece3
SHA10ea79e84a2d849cc207610e93a0dbd52961dfaf1
SHA2565802323adbd61903ad13a2c4d5cf8438544276d943ca1dbbc672c07ad0118054
SHA512ae186e97a70cbc2da0525144cb41e4ae01cf20fc177fe8ca228161afd335c5c276f99a04166c8fca64877fb348db4b5b6e1ffa7098bba4e263d6bc488a22b87e
-
Filesize
315KB
MD50c1b66f340ecd052ed90de2f65122134
SHA1145a54f79e6e6d6fe63c85ba999486764272f7d8
SHA25635395f12a4655109a0bab4279b9251795f18f601b914b479ab28f7cf6998b61e
SHA5124bcfe30ae2f5b87692e37ab79eedcbde6bb368d34bee9193f4c751a2130b29831bb44966c92968394a0e577af679f9bb256ec5f5ad770e855fa89c3082286f3a
-
Filesize
1.0MB
MD5e8f96c24bfd3d1424b84732386619b2c
SHA1d6902fe1602db76698f0ba6233c28d8cb32be6d0
SHA256005cc8f865b99c3c4a5fc88632b29438dd290e806ed18ca71da472c1d12f01fb
SHA5126d3780080b6289f7b3577743f36da8f2e2a1e1cc8840440db1cddcf9268d280c11c5c793d0d196dff9afb66f97b97005f98404b81c6f236624c515f643515d1c
-
Filesize
1.5MB
MD5ac05b5c3b1a5bff6a7832539882844c0
SHA12d4f52d8954866665dc5e955934cf08fe40db5a3
SHA256e2ea4332dc491decb1af22edf096ba7655bd890692d7ee2317b9f282a8d4fa1c
SHA512f0e1dcd6a0e2d466aa976636e3f9353000a8a6e91c6c9460f4a7fa5ffe32cf73797e158d21b41425799bc547e83e07e65850dd39340fcf0ce71aee7f3b0a3b40
-
Filesize
1014KB
MD512c65cdda4fd1cb551792f4bd5c299d1
SHA19b93d6298f050b9b20d2f9eaa76e4b95c27cf15d
SHA256003b201a96ef285c79aed1965c19a0b869d1829b0e2de7f61869d57dca17ded7
SHA512145dfc3067f56cf7cc57911abadfe39f85c99fc641cb695c06db6d7f149bf6de155bbffc6c350215ede7f53c97a92287e9c77230de17cb930c450cbc947eada5
-
Filesize
598KB
MD58a0587542e6f49b98ca645cd37e60eeb
SHA17c8264770dfb1995b94735de9a08c09fc81e333a
SHA256011c43379e90dd1d64e4f32de364f6cb14f56048deed637959df3baf759fac4e
SHA512b317b70d43eff9e2121d36cf6fba0d28863d8188a2a6c31852def228727aa7a51cbc9a01f7c31fbfda96d0eb872b981dfe4ae483200134335229c0698ddb92e9
-
Filesize
460KB
MD5699f442d59ad65152953d7f16e104ca8
SHA19f2b93e3e0a7d4b8cf69017ac62aa318c85ee8fe
SHA256a8ee5af25a1a34c37bb4d05a7a6e3c32075ae12edd2b10261c063381ed07655f
SHA512de288220e5aebe1bab075d8a25fcaf3fd137ea17ae3e0487f6f7553c1490dc4588ab4ed7fde3420cf6e35d95cadb988ffb0308c183b683587f115f859c16e724
-
Filesize
534KB
MD5b7e1de38f6f0f301180634b885aed515
SHA1bf34beb7471d49e6819fea8365125a6653c12ba9
SHA25665062b2547ebf178e98e39e0e074f6c5aa4a299c80fb6e6ccff67f0b777bf541
SHA512398790fd7a3b2e19a1e8394fac1801850e200a17b35d48db8fe44900d28185003516b88b10df93e15f259723bc418e664148c9b3d646bffdb5c98c5bcc9d0418
-
Filesize
387KB
MD5ca6ab6b2672b2a049bef5528d3993f6a
SHA1b801f548238a4fe8a95605942e981f044db7c7f8
SHA25671492c6923db0279e574928c5a0e61f8d918f969f82c0150c871a05545e55b9a
SHA5120377670bd44211aec305a67ca613cc6ce2b0e4a94a6bcd6768e6b6efc8305b566a8e784fd67f6ff0ddc16f238cdbbecdce94f573bca1539c3ff21551668f7611
-
Filesize
4KB
MD5b9de1c3959308ca8ce4b41d11f8f31c5
SHA1ed3e4f5ce28c03a70ac67c58e8699ce62d9f9833
SHA25654f5889b99019e5b5ec147484c99b92cb11c2a83d12febdc71a1a4cb07c6cda9
SHA512b4d706b03b5aa700d87e3a3efdf2a4355053c16477a54d598f08ddca2af2dfc914b877ec3eb717ae8d418d7fb72b7f3be9a21d6d2ad1eeed9a85b911d93e414e