Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 22:28

General

  • Target

    7f9a3a1c610299cc2382825e3509a15e1108aa1c4cb2202ecbf7c92820e87b2aN.exe

  • Size

    512KB

  • MD5

    d395966cacc7b5a001ef82499c186bb0

  • SHA1

    c473287670070c30118ab52511c5cd50c736f99e

  • SHA256

    7f9a3a1c610299cc2382825e3509a15e1108aa1c4cb2202ecbf7c92820e87b2a

  • SHA512

    de486a6746d16809d9e42d4df6cc4dd786b05888f47d03db4bd8fb4121032bab24ea96ffc21460e883f9ed22bc5764169408a2d949c1d8516ebee4be8bb141bf

  • SSDEEP

    12288:M87I2LAzi4E0YKN4W0goGaks/hNXZh9AdVOgZAAZXi2Ov03s8lBZD7JpE+HK2RTM:NRUzjYcV0Tlf

Score
10/10

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f9a3a1c610299cc2382825e3509a15e1108aa1c4cb2202ecbf7c92820e87b2aN.exe
    "C:\Users\Admin\AppData\Local\Temp\7f9a3a1c610299cc2382825e3509a15e1108aa1c4cb2202ecbf7c92820e87b2aN.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2644 -s 548
      2⤵
        PID:2744

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2644-0-0x000007FEF5E73000-0x000007FEF5E74000-memory.dmp

      Filesize

      4KB

    • memory/2644-1-0x0000000000D80000-0x0000000000E08000-memory.dmp

      Filesize

      544KB

    • memory/2644-2-0x0000000000240000-0x0000000000246000-memory.dmp

      Filesize

      24KB

    • memory/2644-3-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB

    • memory/2644-4-0x000007FEF5E70000-0x000007FEF685C000-memory.dmp

      Filesize

      9.9MB