Analysis
-
max time kernel
33s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 03:55
Static task
static1
Behavioral task
behavioral1
Sample
sss/Driver.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
sss/kitty.cc checkers.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
sss/kitty.cc temp free.exe
Resource
win10v2004-20241007-en
General
-
Target
sss/kitty.cc temp free.exe
-
Size
2.3MB
-
MD5
6e1a1ffb10d212e5e9562342afa026be
-
SHA1
c544d57ad94e0020d0f82e7d6ef8e463e95f8724
-
SHA256
e8a2b0de7c644d96eba81c0797127f4328005b93e6e1b8c7547c75b4c1f29bcc
-
SHA512
cc297e173e448b9a9a5194b4eab408bfde6fbcdfbb09cffb67331033070fa68feb2a67a4e4021dc19b73d959f18ad3fdd1f6c33d58dbb67631bdf29e82c543ac
-
SSDEEP
49152:amMK1130Prnv4r0u04r0uf07ITYbNbNWo4kSH3OqtwIW+M:amh07szVzMIT4bNJFY3Oqta+
Malware Config
Signatures
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kitty.cc temp free.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS kitty.cc temp free.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer kitty.cc temp free.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion kitty.cc temp free.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1728 2204 kitty.cc temp free.exe 91 PID 2204 wrote to memory of 1728 2204 kitty.cc temp free.exe 91 PID 2204 wrote to memory of 1728 2204 kitty.cc temp free.exe 91 PID 1728 wrote to memory of 1940 1728 cmd.exe 93 PID 1728 wrote to memory of 1940 1728 cmd.exe 93 PID 1728 wrote to memory of 1940 1728 cmd.exe 93 PID 2204 wrote to memory of 1728 2204 kitty.cc temp free.exe 91 PID 2204 wrote to memory of 1728 2204 kitty.cc temp free.exe 91 PID 2204 wrote to memory of 1728 2204 kitty.cc temp free.exe 91 PID 1728 wrote to memory of 1940 1728 cmd.exe 93 PID 1728 wrote to memory of 1940 1728 cmd.exe 93 PID 1728 wrote to memory of 1940 1728 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\sss\kitty.cc temp free.exe"C:\Users\Admin\AppData\Local\Temp\sss\kitty.cc temp free.exe"1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\netsh.exenetsh interface set interface name="Ethernet" admin=disable3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1940
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵PID:4040