Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 15:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
2.2MB
-
MD5
1d3f1b333a438438193b1d29731fd607
-
SHA1
0c8852028d925fc940ad1fcccc7539bf3c0db92c
-
SHA256
ad822394ecd393272d3d1ba77306e502ee90259f4c328dab80e9d6b5e4bd363f
-
SHA512
b9008ef7fc8aadc92fe20df3d3081a06bc561491b3aaac35caaf256f136e8c95c248d1622112ef08cc415f0b6efe10055b4cc31d9b1f88b508c64b688e8f561d
-
SSDEEP
49152:C3YMeBr/pNfVrjepcpNHrMS0p1K4Gsu08+nzgc:IeBr/pNfVvepwaR
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/448-1202-0x0000000000900000-0x0000000000C04000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 756 created 3436 756 roomscience.exe 56 -
resource yara_rule behavioral1/memory/448-1202-0x0000000000900000-0x0000000000C04000-memory.dmp VenomRAT -
Venomrat family
-
Executes dropped EXE 1 IoCs
pid Process 756 roomscience.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 756 set thread context of 448 756 roomscience.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language roomscience.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 756 roomscience.exe 448 MSBuild.exe 448 MSBuild.exe 448 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 756 roomscience.exe Token: SeDebugPrivilege 756 roomscience.exe Token: SeDebugPrivilege 448 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 448 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3692 wrote to memory of 756 3692 file.exe 83 PID 3692 wrote to memory of 756 3692 file.exe 83 PID 3692 wrote to memory of 756 3692 file.exe 83 PID 756 wrote to memory of 448 756 roomscience.exe 101 PID 756 wrote to memory of 448 756 roomscience.exe 101 PID 756 wrote to memory of 448 756 roomscience.exe 101 PID 756 wrote to memory of 448 756 roomscience.exe 101 PID 756 wrote to memory of 448 756 roomscience.exe 101 PID 756 wrote to memory of 448 756 roomscience.exe 101 PID 756 wrote to memory of 448 756 roomscience.exe 101 PID 756 wrote to memory of 448 756 roomscience.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\roomscience.exe3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD56686485b91f2f50fbdeb53b83acd3a87
SHA11fcf914c4e3711332b0a62308082645b4f8bfbb8
SHA256605f8e4d0bc1f92c5bc9b0e37377c8e18226b1e2b4c61c0a0531ba865d66e43c
SHA512588762f9d07ea4887b37f7a217d22ce9061449d17bdc7948d1fdb0139315d7d56c0cc30b28dafd2f33358d17e18ea452af5bb7fab6f99e8b7d7aabbbc3236924