Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe
Resource
win11-20240802-en
General
-
Target
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe
-
Size
1.5MB
-
MD5
ff83471ce09ebbe0da07d3001644b23c
-
SHA1
672aa37f23b421e4afba46218735425f7acc29c2
-
SHA256
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba
-
SHA512
179c724558065de4b7ea11dd75588df51a3fce737db3ebc77c8fdc0b3a432f6f1fdcc5acd2e2706ab0f088c35a3310c9e638de92ce0a644322eae46729aea259
-
SSDEEP
24576:nK7tMGUfQtpOdk3xWBq0qWH6JubmMTzfZwLDC4pZylqUAc2:JQ7AkiqQaJjMHWvlpOqUt2
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1396-33-0x00000000011A0000-0x0000000001238000-memory.dmp family_stormkitty -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
Optimum.pifdescription pid process target process PID 4576 created 3480 4576 Optimum.pif Explorer.EXE -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe -
Executes dropped EXE 2 IoCs
Processes:
Optimum.pifRegAsm.exepid process 4576 Optimum.pif 1396 RegAsm.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 3652 tasklist.exe 2992 tasklist.exe -
Drops file in Windows directory 4 IoCs
Processes:
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exedescription ioc process File opened for modification C:\Windows\ConferencesInto 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe File opened for modification C:\Windows\GamblingCedar 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe File opened for modification C:\Windows\AnchorAnnotated 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe File opened for modification C:\Windows\CheckingReliable 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exeRegAsm.execmd.exefindstr.exetasklist.exetasklist.exechoice.exe9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exefindstr.exefindstr.exeOptimum.pifdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Optimum.pif -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Optimum.pifRegAsm.exepid process 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe 1396 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tasklist.exetasklist.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 3652 tasklist.exe Token: SeDebugPrivilege 2992 tasklist.exe Token: SeDebugPrivilege 1396 RegAsm.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Optimum.pifpid process 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Optimum.pifpid process 4576 Optimum.pif 4576 Optimum.pif 4576 Optimum.pif -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 1396 RegAsm.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.execmd.exeOptimum.pifdescription pid process target process PID 4876 wrote to memory of 4188 4876 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe cmd.exe PID 4876 wrote to memory of 4188 4876 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe cmd.exe PID 4876 wrote to memory of 4188 4876 9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe cmd.exe PID 4188 wrote to memory of 3652 4188 cmd.exe tasklist.exe PID 4188 wrote to memory of 3652 4188 cmd.exe tasklist.exe PID 4188 wrote to memory of 3652 4188 cmd.exe tasklist.exe PID 4188 wrote to memory of 1468 4188 cmd.exe findstr.exe PID 4188 wrote to memory of 1468 4188 cmd.exe findstr.exe PID 4188 wrote to memory of 1468 4188 cmd.exe findstr.exe PID 4188 wrote to memory of 2992 4188 cmd.exe tasklist.exe PID 4188 wrote to memory of 2992 4188 cmd.exe tasklist.exe PID 4188 wrote to memory of 2992 4188 cmd.exe tasklist.exe PID 4188 wrote to memory of 3552 4188 cmd.exe findstr.exe PID 4188 wrote to memory of 3552 4188 cmd.exe findstr.exe PID 4188 wrote to memory of 3552 4188 cmd.exe findstr.exe PID 4188 wrote to memory of 2756 4188 cmd.exe cmd.exe PID 4188 wrote to memory of 2756 4188 cmd.exe cmd.exe PID 4188 wrote to memory of 2756 4188 cmd.exe cmd.exe PID 4188 wrote to memory of 856 4188 cmd.exe findstr.exe PID 4188 wrote to memory of 856 4188 cmd.exe findstr.exe PID 4188 wrote to memory of 856 4188 cmd.exe findstr.exe PID 4188 wrote to memory of 752 4188 cmd.exe cmd.exe PID 4188 wrote to memory of 752 4188 cmd.exe cmd.exe PID 4188 wrote to memory of 752 4188 cmd.exe cmd.exe PID 4188 wrote to memory of 4576 4188 cmd.exe Optimum.pif PID 4188 wrote to memory of 4576 4188 cmd.exe Optimum.pif PID 4188 wrote to memory of 4576 4188 cmd.exe Optimum.pif PID 4188 wrote to memory of 3204 4188 cmd.exe choice.exe PID 4188 wrote to memory of 3204 4188 cmd.exe choice.exe PID 4188 wrote to memory of 3204 4188 cmd.exe choice.exe PID 4576 wrote to memory of 1396 4576 Optimum.pif RegAsm.exe PID 4576 wrote to memory of 1396 4576 Optimum.pif RegAsm.exe PID 4576 wrote to memory of 1396 4576 Optimum.pif RegAsm.exe PID 4576 wrote to memory of 1396 4576 Optimum.pif RegAsm.exe PID 4576 wrote to memory of 1396 4576 Optimum.pif RegAsm.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe"C:\Users\Admin\AppData\Local\Temp\9e7bf4b2bd7f30ea9d9dca6bc80d28c5b43202df1477a4d46f695e096dce17ba.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k move Surrey Surrey.cmd && Surrey.cmd && exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe bdservicehost.exe ekrn.exe nswscsvc.exe sophoshealth.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7195804⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "copehebrewinquireinnocent" Corpus4⤵
- System Location Discovery: System Language Discovery
PID:856
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Utilize + ..\Verzeichnis + ..\Built + ..\Vessels + ..\Cradle + ..\Jaguar + ..\Comics + ..\Flux + ..\Liberal f4⤵
- System Location Discovery: System Language Discovery
PID:752
-
-
C:\Users\Admin\AppData\Local\Temp\719580\Optimum.pifOptimum.pif f4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4576
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:3204
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\719580\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\719580\RegAsm.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
619KB
MD543ca848d3a9ee13623e355d9ee71b515
SHA1944f72b5cc721b44bf50c0013b4b10151972074d
SHA2563d4000a64c1b7be8fcefe59e8f39f1ae12ef1fcd9d30a39158f83b26ee189831
SHA512e52336e652a69b34c41aa9283d8e2e8e795c5734507b23050f48aa25be4423eafcc416f38bf23463de0602c20a24f0fd75629ec23214119b4c4a98025be8513f
-
Filesize
58KB
MD50a91386341f9d1a371bc735576b276a4
SHA1a02598ef42cef1443cc94a8310a6c02df07119d4
SHA2567b857693641ff1ff59e69422b09299a5580d20677acd530c27c7fbc9e3ee3b92
SHA512b492508575c01689c982a8eb57fac2b5759e4c843c92f99d231b63c25ab4c82fa7fece9d4e9c2cc436a3232b4ed7947baecf2a06aafbf1a3cf243395af71e96b
-
Filesize
66KB
MD54a3aab84dbfdaf25ae909ac736489f4b
SHA176663cb1186f29fed429863013600c9d69355d36
SHA2562caa4849a4353ca50dfdbc860412e95b783fdcc7e60d8756c9b4bdf2915e1923
SHA5121c2b0ffa8783bb9e9082eae4214547d8ced58121e717b57884a56042a7ef70c55e702d7f018dea72ca95aa40170c6f24ccec7d56fa3b160237969b5c0473bea5
-
Filesize
236B
MD5148febc94e0f8036a074350ef338b007
SHA11be93210e5348f9409fe4162599dfaad797a2ade
SHA256849892bc358956ee263db6cbddd4a9cca0e1564d6caefe44e2e998d559e610a0
SHA51272b83e8cb35bf6fe295f1cb84197f3ffb4944e19b9ece9f6664ed2bc4aca40c9c912debf260e891c80feebb4c84935da4c2996b9a100ce94cde177928f31fa92
-
Filesize
78KB
MD58c59dae352a159e484b0de9603dabc11
SHA134992e582081635abf736ec18f1492ae40ca4925
SHA2563ab028b25bd6bd3ba48a92c4198dd8ff07fe71b4b41c785469d79da422f2fe46
SHA512cf041cc9470ac479702c19714d875868a5168940a8d56715a98ae3d52f0363ffab160566d7c364b1bd9e8cb263b7e2b60e6719dbac7b6ad12e5f6a87e4f57d8e
-
Filesize
92KB
MD5523fea93bbf3f0b9ddd4d1a432b624c9
SHA1578ccd6f97455881ca61fddf068695ab0daa8918
SHA256f4e881ea8495c993e2f008e9b5fc082bc2cea97812fe944dda293f3b02fb60b0
SHA512633474c0d83e92171d09ab5849b83a9bcd613f630ec54ee44ad42ac8102d25c987f9e3ec71ea6c2d3542bcc9919ded6e37c3754a8f074aeea9704f16770692f4
-
Filesize
872KB
MD567ff730b62d42030058393ab3f0dafd1
SHA179215f079836dd43b4f7b1e66739bd7dab9fb6a3
SHA25695d53427ef46fb44354a0253a611e342a30428101acaf83215f5b21432afbff1
SHA5126e7d6f12686b0b30c96eebe01546e4aee1adee39a7467409e8f41de9a37c65daa010ebcefa6c452d4849e7ba0bec9be55be1b38250420b40e2956c151478d973
-
Filesize
93KB
MD5fdadac1c5944e618315f608ad2f02714
SHA1debe3ccc5a4abc326dbcb4a86ec8074671a3417f
SHA25649687025dce701973b47fb6caba71f1443471e64551f41967a6a3275ce1e93d5
SHA51292d7da5ef3625157acb00752b74fcfb80c588bc3ddf8b7fda488f68d0a6cf332aade539ee92139a26c5dc3549c8a69471ca24fcb1568068d5293b8988bbbab58
-
Filesize
38KB
MD5524c0177830e8a3624062be7eddfa277
SHA10a830e50e9433d530094edf3577b7ec5c5d1c5f5
SHA256aacfabd8f6dde87949cbafa8eab7536dc5377e726064445e62824d10584eaec5
SHA51279ed8be7d451a885befb7001c52a9f0db3977be8e16abd7db9f7742d520270a650ac77ed72e512a377d8f888bf05643f6bce3fea2d4dba8f37c7fff73a70d0cd
-
Filesize
14KB
MD5721cde52d197da4629a6792103404e23
SHA11f5bac364c6b9546ba0501f41766bb25df98b32b
SHA25666627eef98fb038f1d22f620bc8d85430a442d08313602eb02f0b158b5471812
SHA51263a6786227915bc450ea9ca4df4962126b4194a1fd5c68fe3c686da8175726d4efdda5e88aedea7b8e4e758816b9b31981fa79e37dbe51028650def5042ccac6
-
Filesize
83KB
MD54bb39f0bce8a4f7b640ba76ecccaf87b
SHA1c0c7feca88b0fc3fc1f20d1963ae25388a1f4c12
SHA25696af995b201e5392293f2d7272b1c9a3f0eb671d62aeafffb4b0bbbfed0e3560
SHA512ad2752281067584233cc19b3d0bbd0178dc3907af71c8dc3c37afe35f417afe1b1fc4d9ad2d99506d53100afde8ddb692e93669b8c9398782cb03dc22a04e1ef
-
Filesize
61KB
MD56a5ab833602af088d60d3d7f89b77229
SHA132f9fe7c6ba035993a627a78491651f02d0dfc97
SHA25641586643456496d40c3279839a1cb1528428c19deefb4c702bd58f1467a1a1d0
SHA5120598b2b38270a8d282ae2325330420b467be203047dffc2e85626fd78e78f81c5084487eebfbefbcb36115732a6670a9857655c18803388c02e37fbcf51aaa66
-
Filesize
50KB
MD5d64ef3bbcca2c221c0bcc85a7b6d5209
SHA15c3cf9d492c7021e19e103fa14ab3965fd1c6ba3
SHA256c8c35545936faa3b0e00aa1b907952e97fffd9c1958045253863b4c2fad7f295
SHA5122b6713646373b5b233295930a46fefbd499b607a94051c6294d3dce12f58b187c98f22f7f0b1243f22611a82c659b1d95f70a7858247b8f0853a1765d449e611