Analysis
-
max time kernel
149s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 15:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20240903-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
download.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
download.exe
-
Size
920KB
-
MD5
072ed4ac5ad79de811c1ba615036b2cc
-
SHA1
9de87af03335efef2956b0f73be5fca8e37a048d
-
SHA256
77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0
-
SHA512
920cf8c4aee5ba3e585604044672cae4d6e3202686feff84522054f1d046f30df8b0e28b8197d0840b482372c7034b6bfd92e4d3120048071e2d684fde13adb5
-
SSDEEP
12288:Sm4lPUJo1mdxCOA7rtigZXEYTT9NOzG4HEnMun252HpMXzh24btEH:SZBUCCxCOu5JT9NfkEnMunI2Jqnu
Score
10/10
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4880-2-0x000001FCCC1B0000-0x000001FCCC248000-memory.dmp family_stormkitty -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
download.exepid process 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe 4880 download.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
download.exedescription pid process Token: SeDebugPrivilege 4880 download.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
download.exepid process 4880 download.exe