Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20241007-fr -
resource tags
arch:x64arch:x86image:win11-20241007-frlocale:fr-fros:windows11-21h2-x64systemwindows -
submitted
08-12-2024 12:08
Static task
static1
Behavioral task
behavioral1
Sample
setup.zip
Resource
win11-20241007-fr
General
-
Target
setup.zip
-
Size
1.1MB
-
MD5
f1a1e48a1b717914efa37c23c9e26f33
-
SHA1
821c4a93335359c3e54d84df8935b6e4aca65078
-
SHA256
cd2a3b6dac6e3a9483df3ca219df51ca77ccfaa14213ca6ff25d072b4fee24eb
-
SHA512
bd1c0f3a95d4a465404f863b88236866250c64689162db205b9e22f0ebb7f3352e770a32961f77a62691c0dabd030fce5614cf735c342b01db60540cc99f707e
-
SSDEEP
12288:irJoIkjGs4Z3BvuHzuHfijjHIisCJ3HL4AV77Z2OIwfBPXquh7nwXzQzDYcKSlN1:kn3QT8qvoi53UAn0OIMxl7+uFZFQjnQ
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x001b00000002ac0a-3.dat family_stormkitty behavioral1/memory/1920-5-0x0000000000BA0000-0x0000000000EA4000-memory.dmp family_stormkitty -
Stormkitty family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x001b00000002ac0a-3.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 1920 setup.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1920 setup.exe 1920 setup.exe 1920 setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4804 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4804 7zFM.exe Token: 35 4804 7zFM.exe Token: SeSecurityPrivilege 4804 7zFM.exe Token: SeDebugPrivilege 1920 setup.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4804 7zFM.exe 4804 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1920 setup.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\setup.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4804
-
C:\Users\Admin\Desktop\setup.exe"C:\Users\Admin\Desktop\setup.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD50fec7c25ae41bd0cdb48e500024a70f8
SHA1edb70811ea4e77db3cf1be4e8292b1aec4868a79
SHA256a072692240a98e08b304e863f5f6550a3730da6cb0df8fca4fbacf92f43d4bd2
SHA5123a21b97c257ae5ae7d804f593ac98cc479621c21ecabb54b3af7d9605fd3a60f6cad78d0a78369708e3fd55965a0d833210ce6eb7163f14776ae2c96e8f5d9e6