Analysis
-
max time kernel
50s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 20:16
Behavioral task
behavioral1
Sample
StormKittyBuilder.exe
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
StormKittyBuilder.exe
-
Size
18KB
-
MD5
6ffb3a24dc88099e67a5b8d34f62b7d3
-
SHA1
a18bf1a905804936216c2a917d2f162288bca30c
-
SHA256
d68b4e70c03590d797a61776947db316ff18cc4738346880886c94b04e4f631e
-
SHA512
d4cfc4ebd9255e23706f2a088779c7e7a878205f1aa2f00885bbd6411336cac6c27feeb40fe2677cabdefbc78c2868b2bfb53938451a7aa16fa483c2c8bf06ad
-
SSDEEP
192:ZaVbpZPqQsHSZ/2LvegCOhNo2Chg3t5p70fOVXIjXFEs55zh4+W/YPWZTUexTq:A7OL/hNo2Kg9PZrs5HQ/YcB
Score
10/10
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/3500-1-0x0000000000470000-0x000000000047A000-memory.dmp family_stormkitty -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language StormKittyBuilder.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3500 StormKittyBuilder.exe