Analysis

  • max time kernel
    144s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-08-2024 22:41

General

  • Target

    714b920e2e9691e98d269641f49a958a9324ed6bec404620c4fa2db5624a7e27.exe

  • Size

    843KB

  • MD5

    1538f2496409067d29289d9223e22a39

  • SHA1

    a5b76c1277270fc2644399fe9ada46fcf7c20489

  • SHA256

    714b920e2e9691e98d269641f49a958a9324ed6bec404620c4fa2db5624a7e27

  • SHA512

    04b94808d1f79c526cb673b47f75064bffaa28b6b44ca2efc669fa43ddbc7091d51722a8781d6b29bee46eaec3567d1f80400678df3410d3a05bd828d90ad4d1

  • SSDEEP

    12288:lGWGDHK/4O4v9tIr8aVwDTadGRmNQ51038WcqhVTnvJkxmwH4E6:lGTX9tIr8gw/wPS638QhVN84

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\714b920e2e9691e98d269641f49a958a9324ed6bec404620c4fa2db5624a7e27.exe
    "C:\Users\Admin\AppData\Local\Temp\714b920e2e9691e98d269641f49a958a9324ed6bec404620c4fa2db5624a7e27.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Windows\system32\schtasks.exe
      schtasks /run /TN Update
      2⤵
        PID:2708
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {3D89297A-9BB1-4860-85B9-8DBF6AB8471E} S-1-5-21-2958949473-3205530200-1453100116-1000:WHMFPZKA\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Windows\System32\svchost‌.exe
        C:\Windows\System32\svchost‌.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:776
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost‌.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2820
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:2
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2812
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:472081 /prefetch:2
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1140
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:668691 /prefetch:2
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2416
      • C:\Windows\System32\svchost‌.exe
        C:\Windows\System32\svchost‌.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1240
      • C:\Windows\System32\svchost‌.exe
        C:\Windows\System32\svchost‌.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

      Filesize

      579B

      MD5

      f55da450a5fb287e1e0f0dcc965756ca

      SHA1

      7e04de896a3e666d00e687d33ffad93be83d349e

      SHA256

      31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

      SHA512

      19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

      Filesize

      252B

      MD5

      611b530c95f0b91784c8e937a5a3893d

      SHA1

      f2c59807f8aeed29b0da63c8f77b3352893e08f8

      SHA256

      8e56b39eb1711226ccb5e5103b9c8f7dba16e8c160598a3691b6e817da5c5a49

      SHA512

      53cc3d9931e1044c560c794dcece180f6cff5938f781fb308028a4492ed93ec0d064c24fb1b090c9ad7f83381086bc6788f93ac9dc7349f479708df9dd482baf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fbfc6d1aadd50201aac0a92831a5d6cc

      SHA1

      f502ed1144ef81d665eb7c45458541be65e16fe3

      SHA256

      899c58a699eceff7f867e73c5c70e9edfd93b8d9e8c40f776023bf26db6fdb56

      SHA512

      6dc22bea10cff4457fd366613bc2a66475593a24a12811b97c60c3c9cc1a70a70804e4a187e614ea195869127dd933aafe0ce4319ef07284e8c961b05f2ec5d5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2df8beb9d6f4e99e0d44884b27f43935

      SHA1

      7ec1c1b4fca4e4039a62df09711c38ac542d1ce6

      SHA256

      d921cbde6732c543bc937668ff03a91888574f66fb2ffb99b02e33e07e3d145f

      SHA512

      4b60ae6063c33175fbdd1b6bea3b9c6f2115bb0a438db8d32b913a528b17bc098c6297289d135531bda7c5116642690b7bf474392406af3ae1aa9ee529ee11a7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      5ba491910fcd80ecaa92b0b9585d6913

      SHA1

      e2c140ad02b041966a2215a41a7d07d47ed5e064

      SHA256

      076ea0ac6fd6d7dc672bf259e93e05d82bb49003956b4083f06ed4660b4cf615

      SHA512

      026dd6d7ae83204c4e4af70765399a2475064e5812f37935d2144986e382f43ef4198fc6e0a771c318cc092fc965dfca45921808b05f6c4f7d21c51456ba5a3c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ffc3f9bbd96846d0f34d15e7f07fc367

      SHA1

      8fe6b6e363fdd7fa98d4332a4b518c1c5c4494c8

      SHA256

      4f52cbf3c6f8b89f61a72d7bfae7bff86293d44f5009c2daf6656adf57b5f540

      SHA512

      daf2f7e285bbf3b8dac67222c12a37100539ec00d32b89fc1bc351d5dbb6794a7412f890facc19a537fd827492ce73eb797c597fcd73a029683221aa3882b346

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      892b601bd4e71e53178fc0f80555de78

      SHA1

      06cb2f90871031fb0a4047fa4606318399170ab0

      SHA256

      740e7a06366b519246ab623a51c1c6c49b6977847648ed3a7623a8106e62495e

      SHA512

      a370c940f693c57fb10d35954a59723cf79adc35d3b3bb96b82aecd58cfc4f07777994407285db9a17734e60e4de34711692b5acc8beedaed6c2691081cf8cfa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c736a117fe1d600424953c0419c57616

      SHA1

      e0da8fde1e2d5e1fd6cfcdd561a7d281d4f0dc72

      SHA256

      f72d23b7b7aad161d83de549a664c5a874037b41863c395e64b6122cca77c3c1

      SHA512

      b14b832b3ad8c18829c25569c61f5fe86a646ffd8b4c4707f778e6b0765c1a1498812ea03689c5ab4bf4e421dd708ee66f5cffc95c775c92b2db231d0958c4d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      143282028c6ff3752c2e6bb2c3cf7953

      SHA1

      5d16e7ef2c2a8865ef6a44c8a5125d840fe9437d

      SHA256

      1bfb00a186f9ce81081ca228548f3aba7d1d3f5047b7b2bb9533ccd575b3484f

      SHA512

      c3a5817e1d09fc10876d003ac9000e119f29144008282d743ce476493730fe8645e18a8c6ca11c704c22be8ad983623ae371d87e65e1c6ac4302a2e973fc1068

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7187e8861ecd9f1c00bfdc17605baa25

      SHA1

      b9011b7f9956dd7caff53e301456a8107b64a30c

      SHA256

      5f38100cb3b9f0aaedd4a11d69bd5df9f4262b50f0803c48394ff4c85aac9e05

      SHA512

      77c6cda03a7ba6f7b1b843add5185c7758288bed3298517de382263c751ba8a56499859c56638996c2334d69c29c191d22ae2e5c4d5b1145f939bd8af71707aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7e3e42f0d1727d4a393f648d7d109abf

      SHA1

      559378a31098038e3950c9a7ab883cf278a5e68e

      SHA256

      96a1099be81ee885fc33f9e4f42781f3fcada9b16043204b8ff25ac8e7ef2104

      SHA512

      98aec97935fc74bbd27fc82c844a803474576809ddff929c7c8743bfbdde7e659848bee991637fd94baf0aead090590de948635b7cc055ad5be8c80240297f0b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      4c280f239b79ca39e330076c109be757

      SHA1

      75c0e124071e2096bcdd87eec6b2757ac5648450

      SHA256

      48dd05339bf7b3086666944584443211382937581c41ca2a7220520e005d7daa

      SHA512

      516325fe1ad842cfb1ebfa4acf70465b579cf2959cbeafcbb285bbec62158c759408204041c5f632524cb4b1e29826b7b9b1f72cebc2432dcec6af1c43be92b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      19cd376764400613f5e2cbefc3b7df09

      SHA1

      14bed02bcfb5d37814d8d7a650a9554065a53bdc

      SHA256

      541224bd99dcae315081962389f5a9d26e43d9ee1673047e1385995789702bd5

      SHA512

      81a25f760dff8497b1cb481fb4437fb50dd5430c6d4bd696c5349cd4b8159aaa42b2613aaeb7e829da81c1d817f8b5a545c9cdc963108996ab587d0b6f2ba0f6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      1fc7aec480dc67a2615cd05381bff0f6

      SHA1

      09559968208cb5c4481a0156a6da40b49fbc9fee

      SHA256

      0593aa18390b48c83c76b5fe96ec4e24823fa9596b2753c43829c65aac6619d8

      SHA512

      8c49d017b103e9d18ce11999c74dd7d768a1bbb502c698976e2305a1f77d9d92754a8155f06172fae9d331677a2a527d20abef1b60b85d854416a91784cd7ac8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      15023ff1ea19dbb0396184c3d5cf013e

      SHA1

      a48bac2e33c6c6e86bb1971d0018aaf323e04f00

      SHA256

      09d2b78c20ef826034ec901b41335fd7567ac25f7059304a269351fbfb9f35f0

      SHA512

      70c9120c0c43c7e5d6b3ebb3a5dafbb1c6485b5a7e80dbd1f4f398a72394a6386e889b8f132531f57b2c63bb66e194cbc182df501d2a2155bbb5a0c3b41579b1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      46d6c2aa89675acf1230e6a69cb13da6

      SHA1

      1e4a9954a750855da70e105df27150732f1edf12

      SHA256

      326b20bec857ca443e19355581b77bff8d45e901d738777c5bd3bb290ed16bbd

      SHA512

      67326cd30802fe3925187264c36ba7821eab91e8b13eaad8291692d8e602093baae6a9fc52e487a302ad60f74da4a641376341988d27d8a73d146fa641b417b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9f7c2af4f3437f97057cbea619ad1455

      SHA1

      fe5d042a79ae7ab1c967637b9d5c91008f2c25a3

      SHA256

      63d0bc0a59967ef4bb0cb2b942482472255ed73f563236944550c66e5f31354c

      SHA512

      425a22bc2fa17498b3a8cab6e637e9eab12e5448dae6b64d89f2723994f54234d115a5cecc4c35de3a9d59a1765ffdc3e45a33d9c38a369deb00e1be9374d17b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f2debc0da4b3cc35d67dc45f231f5fac

      SHA1

      8bfa8cf1df3f3c03e2c1444f9f3dce05f61870e3

      SHA256

      9f8657f7d6d35c8bf6853afc03a1db942ae42f30aa4b9cbc6fe8c1db5066c2ab

      SHA512

      57c1536f228475e25679a17c94b9a465c96c24ddad5c885e5a2558b108be72e73a02f36ae99089960fce48fa8b34ea54bf743e44a2964cb24e98c59af96bc734

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7392ad5494f75ccc08df5ad09ed35453

      SHA1

      ffa86ca91feea609acc758ab48b66c4fb089fa6a

      SHA256

      d2dd7b3bc0bd653284b807e9e0ee438c6d7f984815d5bd0036382d7e913c74d3

      SHA512

      1c6c9d254ff902fcb523bd6faccb353fca1bb64654fe60c5dcbe40ae06f623c039cba04fb4cf48a3211d9282227b71841a47c7c6b81f88b857c8a99bfb8d08cc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c24797e7a67de4a71677ca58c84de0ae

      SHA1

      37a0abc13660a187d8c5261654434ddf10f57918

      SHA256

      6a8a0101835312b8d834748cf9e0a9778edd7f338ac008f5b3c01d5904e9f1f0

      SHA512

      915a957d93096d95c94cff1fe3a455541e9a572980576a13b76d2eb08e4ecb46e4a229555b2167f9ab05874d5f9a86002e83b5c0a787f6bfeeead2fc175b707b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      41c4a29dabe2576bd2083b44a0b8fe17

      SHA1

      bef326b59c10b2b72f35ec6d0d36c67bd2bd0998

      SHA256

      ebdffac18945150f13debd2f3523295d9f600959a44944f269e425c61eadee11

      SHA512

      c82bfe497df705f095f6e44feed0ba679c8f1bfb72cf88f12f79aed5cb749931acfad311b24ac395ee469c90d4446957913a77ac5c32ec3f84302e230734a620

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      b8e5e32f4a013631fd07b1f312603f6c

      SHA1

      565750a727eb06495652f313bb0fd78b5c4f9bd1

      SHA256

      4299cca2c0f94e8f2dc568a502792bde3f55d41470b5c1bb626233d6c4a5f484

      SHA512

      2efa8229e811a3501cf445e61b5855713d52d1083b5e01195e66d185dd7c2fa48e391cd68a9ce52f7269cd6d5fafa195507e8e86aac5c5176820b3bec51e81fd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      077179989766b338b86943f9ea8f0d7b

      SHA1

      71f483df84f7e7315f8a719417ae6e41a6a1cfa7

      SHA256

      222956d78e943d5ae401040d4aa3f56b4321ccd4196fb6bf71ca2677ab4f0e3c

      SHA512

      16fe1285b4923142f5f66e9872b89baa0674fbe03447c10757a312b069675efc1695d1aec7bf24cbf74b3f90570ed9ab4408fec817615518f8a7d3616aa1e4cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      bcf4bdb3f05b21dea6d85105104db7e6

      SHA1

      d6fba28ba016c11c8833b48f71a2171f646a4cdc

      SHA256

      82ab8e9baccc7169a9163c1d5ed4282ba76811c86574a5864dd05f76de42b471

      SHA512

      67f6bd75918ef36bb337c209a10ff0aae1f97dd1f6c100124978a17cd92369a5c9b65924b4894b2586e267d6c6f51946a95e8074bce14eccd3e0a31a428e7a1c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3f0b2337a148819101bbc6cf291f7b03

      SHA1

      d2443feec7f2eb936c83908da5afd9a929b10405

      SHA256

      1f7aec657103b80038543d318799e74eb2d9cfcb6389b95999288b59e09be475

      SHA512

      8d82fc39c5bbc6b58b6e5d14d35ad4e6d79366d663355f42253a84708853c2b2f29f14485456e25ceb96599353c29a9bc8e222982308249b0fc1ad849ad7cad5

    • C:\Users\Admin\AppData\Local\Temp\CabEE1.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarFDE.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\System32\svchost‌.exe

      Filesize

      660KB

      MD5

      5bec8d7c881f1ce48a094715ca77aab8

      SHA1

      d6152df4e0443293caef5efc9a89f046a0fb583d

      SHA256

      fd0ae8e49b453646c28a7b2b6ef4b77f17586d7192ca3c8d647a0bf8abf810c7

      SHA512

      255996257ad2e03d6f04e9f41df673ef7b314ac98de415c626e0d34a0da7d686e6e29ee0ba43f9d61f34a89512abd2746628256cb162e49fb7f20f596ed6b593

    • memory/1208-0-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp

      Filesize

      4KB

    • memory/1208-5-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

      Filesize

      9.9MB

    • memory/1208-2-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

      Filesize

      9.9MB

    • memory/1208-1-0x0000000000C50000-0x0000000000D2A000-memory.dmp

      Filesize

      872KB