Analysis
-
max time kernel
14s -
max time network
14s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 13:52
Static task
static1
Behavioral task
behavioral1
Sample
License Activator Brute Cams.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
License Activator Brute Cams.exe
Resource
win10v2004-20240802-en
General
-
Target
License Activator Brute Cams.exe
-
Size
2.1MB
-
MD5
58acdc2f6ce279ffae7f09e73159f2fa
-
SHA1
2f4f864e499cadefef4cef6dcb999d2a74184e08
-
SHA256
d86c55ca0d9ab94d9e4e67a7781e933e940d41dd9c8e793272a4eb86548fb012
-
SHA512
6cb9144a84a72bff80bf7ea8a35487807ab55f99ae25ec3e684b5626cf8af209b341495cd091cfbbe1976d92621938ed2558c9213bdcb5282140ff66b2c6d03a
-
SSDEEP
49152:jhj9o/Ac0XrZdl2xeC2cZZcbythCBERaO2vun0jihwPH:jToxijC9ZZiy7zUO2vk0jiSPH
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7181778686:AAEMnbtaOsmS5ffJlFMYeA9BDuB8mvZ6F8U/sendMessage?chat_id=6528052400
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Activator Svs.exe family_stormkitty behavioral1/memory/3064-13-0x0000000000A70000-0x0000000000AB0000-memory.dmp family_stormkitty -
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Activator Svs.exe family_asyncrat -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 2 IoCs
Processes:
Activator Svs.exehfs.exepid process 3064 Activator Svs.exe 2336 hfs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 6 IoCs
Processes:
Activator Svs.exedescription ioc process File created C:\Users\Admin\AppData\Local\5cb80b5e9fd143d1ecd2aac219809741\Admin@RPXOCQRF_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Activator Svs.exe File opened for modification C:\Users\Admin\AppData\Local\5cb80b5e9fd143d1ecd2aac219809741\Admin@RPXOCQRF_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini Activator Svs.exe File created C:\Users\Admin\AppData\Local\5cb80b5e9fd143d1ecd2aac219809741\Admin@RPXOCQRF_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Activator Svs.exe File opened for modification C:\Users\Admin\AppData\Local\5cb80b5e9fd143d1ecd2aac219809741\Admin@RPXOCQRF_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini Activator Svs.exe File created C:\Users\Admin\AppData\Local\5cb80b5e9fd143d1ecd2aac219809741\Admin@RPXOCQRF_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini Activator Svs.exe File created C:\Users\Admin\AppData\Local\5cb80b5e9fd143d1ecd2aac219809741\Admin@RPXOCQRF_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini Activator Svs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
netsh.exeActivator Svs.exefindstr.exechcp.comnetsh.execmd.exehfs.execmd.exechcp.comdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Activator Svs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hfs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Activator Svs.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Activator Svs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Activator Svs.exe -
Modifies registry class 16 IoCs
Processes:
hfs.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\Add to HFS\command hfs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vfs\shell\Open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\hfs.exe\" \"%1\"" hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\* hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\Add to HFS hfs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\Add to HFS\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\hfs.exe\" \"%1\"" hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vfs hfs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vfs\ = "HFS file system" hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vfs\shell\Open\command hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vfs\shell hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vfs\shell\Open hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\Add to HFS\command hfs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shell\Add to HFS\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\hfs.exe\" \"%1\"" hfs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\Add to HFS hfs.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Activator Svs.exepid process 3064 Activator Svs.exe 3064 Activator Svs.exe 3064 Activator Svs.exe 3064 Activator Svs.exe 3064 Activator Svs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Activator Svs.exedescription pid process Token: SeDebugPrivilege 3064 Activator Svs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
hfs.exepid process 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe 2336 hfs.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
License Activator Brute Cams.exeActivator Svs.execmd.execmd.exedescription pid process target process PID 1732 wrote to memory of 3064 1732 License Activator Brute Cams.exe Activator Svs.exe PID 1732 wrote to memory of 3064 1732 License Activator Brute Cams.exe Activator Svs.exe PID 1732 wrote to memory of 3064 1732 License Activator Brute Cams.exe Activator Svs.exe PID 1732 wrote to memory of 3064 1732 License Activator Brute Cams.exe Activator Svs.exe PID 1732 wrote to memory of 2336 1732 License Activator Brute Cams.exe hfs.exe PID 1732 wrote to memory of 2336 1732 License Activator Brute Cams.exe hfs.exe PID 1732 wrote to memory of 2336 1732 License Activator Brute Cams.exe hfs.exe PID 1732 wrote to memory of 2336 1732 License Activator Brute Cams.exe hfs.exe PID 3064 wrote to memory of 2144 3064 Activator Svs.exe cmd.exe PID 3064 wrote to memory of 2144 3064 Activator Svs.exe cmd.exe PID 3064 wrote to memory of 2144 3064 Activator Svs.exe cmd.exe PID 3064 wrote to memory of 2144 3064 Activator Svs.exe cmd.exe PID 2144 wrote to memory of 1976 2144 cmd.exe chcp.com PID 2144 wrote to memory of 1976 2144 cmd.exe chcp.com PID 2144 wrote to memory of 1976 2144 cmd.exe chcp.com PID 2144 wrote to memory of 1976 2144 cmd.exe chcp.com PID 2144 wrote to memory of 2012 2144 cmd.exe netsh.exe PID 2144 wrote to memory of 2012 2144 cmd.exe netsh.exe PID 2144 wrote to memory of 2012 2144 cmd.exe netsh.exe PID 2144 wrote to memory of 2012 2144 cmd.exe netsh.exe PID 2144 wrote to memory of 2556 2144 cmd.exe findstr.exe PID 2144 wrote to memory of 2556 2144 cmd.exe findstr.exe PID 2144 wrote to memory of 2556 2144 cmd.exe findstr.exe PID 2144 wrote to memory of 2556 2144 cmd.exe findstr.exe PID 3064 wrote to memory of 1532 3064 Activator Svs.exe cmd.exe PID 3064 wrote to memory of 1532 3064 Activator Svs.exe cmd.exe PID 3064 wrote to memory of 1532 3064 Activator Svs.exe cmd.exe PID 3064 wrote to memory of 1532 3064 Activator Svs.exe cmd.exe PID 1532 wrote to memory of 2156 1532 cmd.exe chcp.com PID 1532 wrote to memory of 2156 1532 cmd.exe chcp.com PID 1532 wrote to memory of 2156 1532 cmd.exe chcp.com PID 1532 wrote to memory of 2156 1532 cmd.exe chcp.com PID 1532 wrote to memory of 752 1532 cmd.exe netsh.exe PID 1532 wrote to memory of 752 1532 cmd.exe netsh.exe PID 1532 wrote to memory of 752 1532 cmd.exe netsh.exe PID 1532 wrote to memory of 752 1532 cmd.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\License Activator Brute Cams.exe"C:\Users\Admin\AppData\Local\Temp\License Activator Brute Cams.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Activator Svs.exe"C:\Users\Admin\AppData\Local\Temp\Activator Svs.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2012
-
-
C:\Windows\SysWOW64\findstr.exefindstr All4⤵
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid4⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:752
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hfs.exe"C:\Users\Admin\AppData\Local\Temp\hfs.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD598a009db64d4ebc11087234c7347ba61
SHA15a350ba68f9e90f1df324dba99db7b1ade047d5a
SHA256d2487832d14d57e6894924305e7032e6f534b186e6e48774467c505f84d91c05
SHA5124b6cdc8f265e0db9293590c00b6c4ecdc27198a647e6d136fe161296e3bd030ca62de87f2f4ed3e4a9d9fd61e1b0f5a4bdc8ae9257fcaa88e6d3a3d95647cc37
-
Filesize
4.8MB
MD5a52fc9a9bec7f0ed12ed90da1d964714
SHA14e18854ed1658ce891b2c08877b511c81c4ba666
SHA256cdba1b96718f1538cb31247514ef3d3cfa4eb7e8640016503b7d19cdb0173995
SHA5129a5d1180f076bbfe1a2f581885d8640347ef9eefe7d9c45c610384f5cbb72933a1da5acd4aed3922b3a94d73e3fc65f93b0db911e274e544dfb240a72945062a