Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
RaccoonStealerINJUANKANAL.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RaccoonStealerINJUANKANAL.exe
Resource
win10v2004-20240802-en
General
-
Target
RaccoonStealerINJUANKANAL.exe
-
Size
566KB
-
MD5
112d2c4d2578955d04e3eb771dd938e2
-
SHA1
d4f7a591ca4b073d96256860637fcc808a369ba8
-
SHA256
e3d91cacfa390bbc7a27ba4a25005569eda0033ac5a3c7b83328be80dbde747b
-
SHA512
72aaffcd1f3ca17be585259c9bf355615d24730773e720dbcf73810c92c8916a23a626d053ba1ebdf81efc4b5e6c283699990d5de6b1752b2df59f72ed8eb122
-
SSDEEP
12288:zwPBfv9vnnK4XFzOpElcxsIDjlk9SUEtssDDND1:MD/K4X0pej8j+9OSU
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4428-4-0x000000001BC50000-0x000000001BCD0000-memory.dmp family_stormkitty C:\Users\Admin\AppData\Local\Temp\Builder.exe family_stormkitty C:\Users\Admin\AppData\Local\Temp\StormKittyBuild.exe family_stormkitty behavioral2/memory/184-47-0x0000000000080000-0x00000000000CE000-memory.dmp family_stormkitty behavioral2/memory/184-50-0x0000000002690000-0x0000000002704000-memory.dmp family_stormkitty behavioral2/memory/2396-55-0x0000000000430000-0x000000000043E000-memory.dmp family_stormkitty -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RaccoonStealerINJUANKANAL.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation RaccoonStealerINJUANKANAL.exe -
Executes dropped EXE 4 IoCs
Processes:
WindowsDataC.exeStormKittyBuild.exeRunIt.exeBuilder.exepid process 3832 WindowsDataC.exe 184 StormKittyBuild.exe 2684 RunIt.exe 2396 Builder.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
RunIt.exeRaccoonStealerINJUANKANAL.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rnts.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Rnts.exe" RunIt.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDataC.exe = "C:\\ProgramData\\WindowsDataC.exe" RaccoonStealerINJUANKANAL.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RunIt.exeBuilder.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RunIt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Builder.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
StormKittyBuild.exepid process 184 StormKittyBuild.exe 184 StormKittyBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
StormKittyBuild.exedescription pid process Token: SeDebugPrivilege 184 StormKittyBuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
RaccoonStealerINJUANKANAL.exedescription pid process target process PID 4428 wrote to memory of 3832 4428 RaccoonStealerINJUANKANAL.exe WindowsDataC.exe PID 4428 wrote to memory of 3832 4428 RaccoonStealerINJUANKANAL.exe WindowsDataC.exe PID 4428 wrote to memory of 184 4428 RaccoonStealerINJUANKANAL.exe StormKittyBuild.exe PID 4428 wrote to memory of 184 4428 RaccoonStealerINJUANKANAL.exe StormKittyBuild.exe PID 4428 wrote to memory of 2396 4428 RaccoonStealerINJUANKANAL.exe Builder.exe PID 4428 wrote to memory of 2396 4428 RaccoonStealerINJUANKANAL.exe Builder.exe PID 4428 wrote to memory of 2396 4428 RaccoonStealerINJUANKANAL.exe Builder.exe PID 4428 wrote to memory of 2684 4428 RaccoonStealerINJUANKANAL.exe RunIt.exe PID 4428 wrote to memory of 2684 4428 RaccoonStealerINJUANKANAL.exe RunIt.exe PID 4428 wrote to memory of 2684 4428 RaccoonStealerINJUANKANAL.exe RunIt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RaccoonStealerINJUANKANAL.exe"C:\Users\Admin\AppData\Local\Temp\RaccoonStealerINJUANKANAL.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Builder.exe"C:\Users\Admin\AppData\Local\Temp\Builder.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396
-
-
C:\ProgramData\WindowsDataC.exe"C:\ProgramData\WindowsDataC.exe"2⤵
- Executes dropped EXE
PID:3832
-
-
C:\Users\Admin\AppData\Local\Temp\StormKittyBuild.exe"C:\Users\Admin\AppData\Local\Temp\StormKittyBuild.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:184
-
-
C:\Users\Admin\AppData\Local\Temp\RunIt.exe"C:\Users\Admin\AppData\Local\Temp\RunIt.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566KB
MD5112d2c4d2578955d04e3eb771dd938e2
SHA1d4f7a591ca4b073d96256860637fcc808a369ba8
SHA256e3d91cacfa390bbc7a27ba4a25005569eda0033ac5a3c7b83328be80dbde747b
SHA51272aaffcd1f3ca17be585259c9bf355615d24730773e720dbcf73810c92c8916a23a626d053ba1ebdf81efc4b5e6c283699990d5de6b1752b2df59f72ed8eb122
-
Filesize
40KB
MD5766b531d3ea87df07f4a30478e0b6fea
SHA13a723efa352eff3421bb1a6fbee9aac3c68a56bd
SHA256d3cf46a48919b2e21163ec3a38b3212eb2a130c0c58e9797590d0ef1767583d8
SHA512a8ba8f652cf030daad7ef4971b41253cfe57717b70c4aeed0ce1689a73d6d92562185e9b9aa672f6da1ce4ab476b152d08026060ed41d1b97f19044c135b4742
-
Filesize
143KB
MD5d067619856f7f3079375960f62b99369
SHA1964d548557dec3aa8e851526b71adca4b4ddbfd5
SHA2569770561d2a27dbc16c230fe88af51f718d7d6274fcd63a3f109c381be848b4a9
SHA5121ec891082ac133833217ce8314f6d163451c5554b789cbf8a5ff0d5ebd0b55a7ec49ea5c408bf784e6952a37526de9e77e6c39b9a4ea3b950c3fda44e7f973b8
-
Filesize
302KB
MD596c3df8d899558286dc9718cd94a680a
SHA1aec23b5649301dc1642cc35ac01a261b9afccfc8
SHA2561cba57cf25eca5211c78a90680c64b01d4b08ce191834f3dd6716c6435b4d869
SHA512de23986e8ec4fb2f75142fe539fb1e201306e812947b2c05fb6d9ce1303db37c07516e7694839f2f657c5ecb358dcb8a5f8668a8c4f1932dbfb0911c379b8681