Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 19:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe
-
Size
920KB
-
MD5
072ed4ac5ad79de811c1ba615036b2cc
-
SHA1
9de87af03335efef2956b0f73be5fca8e37a048d
-
SHA256
77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0
-
SHA512
920cf8c4aee5ba3e585604044672cae4d6e3202686feff84522054f1d046f30df8b0e28b8197d0840b482372c7034b6bfd92e4d3120048071e2d684fde13adb5
-
SSDEEP
12288:Sm4lPUJo1mdxCOA7rtigZXEYTT9NOzG4HEnMun252HpMXzh24btEH:SZBUCCxCOu5JT9NfkEnMunI2Jqnu
Score
10/10
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3508-2-0x000001BDE9640000-0x000001BDE96D8000-memory.dmp family_stormkitty -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exepid process 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exedescription pid process Token: SeDebugPrivilege 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exepid process 3508 77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe"C:\Users\Admin\AppData\Local\Temp\77a52e4ae19762156df88783f4e1cdfafbc91ac50faa089783be0be065ac49e0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4008,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:81⤵PID:828