Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 16:54
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20240802-en
General
-
Target
1.exe
-
Size
320KB
-
MD5
db2bbb44f30afac31f911fe16b9db58c
-
SHA1
e4f9728b0f771e61813132dfd10b245b2f0dc94c
-
SHA256
8d41693aaa810b87d9523a64abac0a0c21db7b9542fbf7fda917a99e4464f89f
-
SHA512
acc12ca3f600e9105762114fa9224bccf4cdb1cfe02e364e3fdfbfe57aafcaa37b82af1e1929b47d9bf1db60cd7c239fbbfb4fea8fb2945b70d51edca8490f85
-
SSDEEP
6144:/3/Q1Q5Ng68j/svuP8wSFUygWK0tWrcBOvn:/3/Q6P8j/svugtZB
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1004-1-0x0000000000130000-0x0000000000186000-memory.dmp family_stormkitty -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 4 IoCs
Processes:
1.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\ERHQJVYQ\FileGrabber\Desktop\desktop.ini 1.exe File created C:\Users\Admin\AppData\Roaming\ERHQJVYQ\FileGrabber\Documents\desktop.ini 1.exe File created C:\Users\Admin\AppData\Roaming\ERHQJVYQ\FileGrabber\Downloads\desktop.ini 1.exe File created C:\Users\Admin\AppData\Roaming\ERHQJVYQ\FileGrabber\Pictures\desktop.ini 1.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 freegeoip.app 36 api.ipify.org 37 api.ipify.org 38 ip-api.com 6 freegeoip.app -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 1.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
1.exepid process 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe 1004 1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1.exedescription pid process Token: SeDebugPrivilege 1004 1.exe -
outlook_office_path 1 IoCs
Processes:
1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1.exe -
outlook_win_path 1 IoCs
Processes:
1.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Accesses Microsoft Outlook profiles
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1004
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD52e9d094dda5cdc3ce6519f75943a4ff4
SHA15d989b4ac8b699781681fe75ed9ef98191a5096c
SHA256c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142
SHA512d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7
-
Filesize
504KB
MD5c76d98c997f8ac028ce1f2a8a2661f80
SHA172da5783149dde5fc740a8cb39f1858ab7b1ddd7
SHA2563f20d70bd8becf30f4ae493b9df8bd5ce3929095e2d7e8eeaf6cfa9b3f50b5e7
SHA512e729d93541334ded83abc5cb364745d6c5477fbc7db3b7cd57ba57a19e79d084a280d3a6f37e21fdeb6e961dab825449e014352190f5185048893f47ff952220
-
Filesize
606KB
MD53ab2f0ffc853ad33b9c5bc1a80ca01b7
SHA1c4636fe9442636b730315e37ab11a093f4db19f5
SHA2563c97505a9fa330a9aa66b081e34da41c2200822d595e2aa591acfb9fc5118a1a
SHA5125723dc46b43af33248e03c778e2733e8efdfb54174958f6943cd5707b43b887f808dbbb514dc75aed7eed1d2282ce7fe01302d688c850d52b572665dce910d46
-
Filesize
577KB
MD59ff54fa0528c2e9779b1edf35247017e
SHA1d23796dbabc16cf121f4d384b007c7e1b04e91c1
SHA256adc7d974e6b3d8da03b72674b0a1488710264dc4f28819553b931e1ed948fe1f
SHA512a986e10fd5478fee5ba419af955510847c1e79dfb2ceb921823bd10c64366ce02dd61dd428105592b1d380f8356f0699eba42af43c4f1af8bf30ba447cce59b9
-
Filesize
527KB
MD5cef9cac1ebdf68a15ff2ddf193842da5
SHA1fe1a8f3b4043005c1138ebd79552b212792c23d8
SHA256cc3ae3c461a6161bc38d781feb5f8ea50475a3f4e2a9a867d1bba08b1d98c599
SHA512289e6958316bac73eb0e73a13d881d6ff467fb958652b6931c09a645ed6dd2f52419fa8e16b485489d9ce686e4468cd547477713d1f09f7a1d41b915e52ae2db
-
Filesize
418KB
MD51979eed1e07cc7e1f3eb5ce365680ade
SHA14322c1b52209396062aebbc5acf0914680815236
SHA2569a124941e6e96418226078bfc9d9e1368374f0059b1f1d33b9f459c95f4af586
SHA5120b01bb3c28f9c3e943439291591645a30a1cd588e55fc3eb9b301e1c0431415f05de02d1014f1803f704429eb6aabca4dcd0b5206e7052a667693cf50144952b
-
Filesize
546KB
MD5ebae275241529b7cbed62116113e8aa9
SHA1be634d57ac3b449ceb27e171610cc29672cb1021
SHA2568e782e0bedfc47193177afdd1658f231a51a09b5a62706e3576e738b0c39583e
SHA5126588992581a80675e7e6b9c5a102d9749b32a892f8b386ab8008bd3c1277f1c4216fb6adb16b78a6456c585f49e619b690cc90fb7c9f065da85a1609c0050944
-
Filesize
350KB
MD5a86d67549ce54b7855a6371168d5403b
SHA110ec342aa9ac34e42d5fa72ca13f78b0458cb80b
SHA256695d70edffbaeae171a7030fbfcdec114c726afae917e1ba9a1ff40e9ed49691
SHA51290983292089b027bfa3f8746e7a2446405952063cc984fa5df7b4fd51e92a6323760dde3b211ff23d7b28010d270e37a05953d681c492fed3d1950356c285806
-
Filesize
271KB
MD586a38c0428bb37258b784e01ae6b9337
SHA15cc6ca1346ea1c99b5fc1acbe055640d935ba2eb
SHA256e3d4e4c3854b54cf10ddfa8a873f972565203196803b282b799e30dce67635c5
SHA5128909d30a3d64bcec2490ae751e89c23ba2dbb9d2fcd86a88a997d6d3530dd322ab7d80cf63baed5a1021859fd79eb2209e72c5f860d935f22996b90dcfd019a1
-
Filesize
637KB
MD55f44c147f715d7fe8e7eac14229a9c13
SHA15d60548baaab7486094d005465c7524524649ea3
SHA256a79a7f36305d1abe7b78312df70b6f3882803df25d932f09b5b0b6729d79c321
SHA512dd2f959b545b76383d115d034589e5d93978691557d68d7b7360709167d1b5df8fe63c1ddda0668f2ae18f12d99e1c1e3aa954a3881f3fa11840f3bd7783e762
-
Filesize
119KB
MD5de201805473ea3fc9623f650dc5bef64
SHA14e1f79a828dafd3eb186752bbefed741a3184850
SHA2565b789fce2310467bf881f02bc3a0400c38adb0170e5d3803b14ec7a9031accfe
SHA5120cdd0a0b208b16c9b6de93f9e0ee243a19e8451bff4b4d5e42cb7b0e8bd237f05040b9c02558b1d4e734284efc1c825138501524c148f8ffdadc3e27d035fd9f
-
Filesize
127KB
MD5565ea464c747c9f0158ae19ee73fdee7
SHA15ccfb1a90bbb98a1d38ec4727c38a57da469d532
SHA25636f95f330908e2c69c8f8b741ed6554f2f2c82c322775391063249bce71e78b1
SHA5120520b91a321f50a1ea523b932aa6fcad129e3e6fcc9a47e5c375f25c0d5e3ba30459cfe5e23d1654156c521ba0e020a2e0cd10bba0745c25dce5db0ec0abd097
-
Filesize
140KB
MD5d567d0f0a9922f7b6d9bc9df6dcfcca8
SHA18fd2fa23549a83e48c3194de618131881bfb0338
SHA256066bfa5cbe380b2acf4047a23558c9dd1073d7c20ee001c26d47a6cf78f96f96
SHA512214663d96921872f343a3f2b987c6525dfd114eeb4d694d4690faf63ab73e186759ca83f44d21e1af15238b9dfe02e8d4429ebb20f33d0ed9049ec177ad365fd
-
Filesize
106KB
MD5de555edaef861c95ddb217a36d353c98
SHA1371759ce1b86684221cbce984bfaba56741debb2
SHA2561ea564b9575967b625c0f0337faee3d545c1232a31350dff8e3e60f0bd2ecd7c
SHA51251a0b1ea045b5eda3e8b591f10e13bca7f0cabafc333285df62230c683792acb0ad4e3e57622f5408b7070f8fcf655a9e42eaa11cd0d71bb064235112abe6d8d
-
Filesize
114KB
MD5d354ef150d31e22ac4d391f98d021203
SHA16dd9a4303e09b541795bc6b6a0d33091996c0ad4
SHA256a207ebab01062ced90818811e221b760fd4530092cad799d4f8d060f24317413
SHA512f6d50a35d520aff62d3c06a1b2f76676b4e7b8dde9fad6c997d4f85f264027820d6e133170b17b821a7f46b1e0e6a7865bb36550ce5618dfc1aa62af18be5e40
-
Filesize
135KB
MD5a0b4c1870133a45e52aafe6c6e75a3a6
SHA1e5f153502642036969625cc42845b1580c2468df
SHA25675758c5924ec02ff3a343a39357cd91ae88b7617918281e388250d6b05ad75ba
SHA5128cbb4323710011862d81da5e1493eb0c9087331a88771a4e58c7fe7fe8fad957e79f71f6f188a0c9c9d931584113fdf6b3bfe271b150c5e5c10fcccb0ffecac2
-
Filesize
131KB
MD5ba077461b8a590799f2d2808bac38e1f
SHA14df025f702377bb019a4f7f7d6ef1bbf1ce66cda
SHA2565271e077b1b540d5eae304b6135e8033756f2222866f33a1684ba336e4a5e63e
SHA512e02ca044e402b675382cb623e13e08f61dc5dd420a0a2030ca2251b6d41c87b7081f096f5abbde33e510840950ffbb72d66feea84f17f33f9b1dced473981b55
-
Filesize
198KB
MD5af04a91dd0040dd6ed696aa9c6758120
SHA1d05f220d6f21b098571fd6c5a1af496d85c43b00
SHA2563aaffc7503c3a6df70662769ae4551aa82280c87bc82d61ce7533fff1423929e
SHA512246b8b2f432032bd722630599739ec9914824f64d08b7816efe62198c4278b11b03c2fe557506a952cd734abd71f450223a6edb626dd2117d36f62f7f06999aa
-
Filesize
148KB
MD54b666b0907816fad3574b7dc3737bc82
SHA1255ab67cc6adc79b2e5db96edfeca367d2f08857
SHA256ba689d789f3bc7446817730bb629d573b2afdc31c1681a6b9327039812d0c345
SHA512d9e93c4d181e04f02eed80125c7910e225d2462d11c0b35b8efca1bf9f646aaef58b86c7303a87f0f3ca5d7abe9d96460739b053aeee5c3d04e3d00b27b02beb