Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 14:26
Behavioral task
behavioral1
Sample
Pc Fire.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Pc Fire.exe
Resource
win10v2004-20241007-en
General
-
Target
Pc Fire.exe
-
Size
74KB
-
MD5
5869edd76793fdda010c3191d14a38af
-
SHA1
aacad694e1334c037e68db2201173a8347afff78
-
SHA256
9b1e17bfb91e74ba74e0b00fba0fa0c71316994cca8145207f3dd0f0e41f1ed5
-
SHA512
3a0cf7e4d6315ca2be833336f579d1d421d03dda2adcf5fc02ee8880bbb4251b8544528e5bc0c0598447dac49dd6dfb357f42b7bab55ecc792e6f82334091d82
-
SSDEEP
1536:fZno9xptw8VGHE1uWdas6vKPHvfpK3INcwqE49aSvwKxjzxt6e:f+bZPfpK3qDqP9aSvwKhzxtz
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/2480-1-0x00000000008A0000-0x00000000008B8000-memory.dmp disable_win_def -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2480-1-0x00000000008A0000-0x00000000008B8000-memory.dmp family_stormkitty -
Stormkitty family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\nvidiaDValueOn = "C:\\Users\\Admin\\AppData\\Local\\NVIDIA Local Drivers\\DriversUpdateProcess_x64.exe" Pc Fire.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2480 Pc Fire.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2248 2480 Pc Fire.exe 31 PID 2480 wrote to memory of 2248 2480 Pc Fire.exe 31 PID 2480 wrote to memory of 2248 2480 Pc Fire.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pc Fire.exe"C:\Users\Admin\AppData\Local\Temp\Pc Fire.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2480 -s 10562⤵PID:2248
-