Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 07:09
Static task
static1
Behavioral task
behavioral1
Sample
job.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
job.ps1
Resource
win10v2004-20241007-en
General
-
Target
job.ps1
-
Size
30.6MB
-
MD5
f01f7141f5dcb2161ee0701949f91e70
-
SHA1
28d2427ee1cd5f4c2a17f020bfaea95daece07d6
-
SHA256
68225e21f08b08bd1890e8e0a5d1b379cd9692a2c4a43bffd7ea6bee5e5b409d
-
SHA512
6cd177e2d4b385365eb9f549d2f869f1a40483e1c8a4fe0655146c7ca28090cdf14ac9c2a8a1cb7c385f6f824fe2da422b1714cb2ca851a0d1a18cb3be2a31e1
-
SSDEEP
49152:/0p9Wz0S8ygXipUpxf2H21a1RFvpB8ciXBXsdO6QKUP+Vzfcw3S6T3G4n/1kbC9z:5
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral1/memory/2504-53-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty behavioral1/memory/2504-52-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty behavioral1/memory/2504-51-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
resource yara_rule behavioral1/memory/2504-53-0x0000000000400000-0x0000000000704000-memory.dmp VenomRAT behavioral1/memory/2504-52-0x0000000000400000-0x0000000000704000-memory.dmp VenomRAT behavioral1/memory/2504-51-0x0000000000400000-0x0000000000704000-memory.dmp VenomRAT -
Venomrat family
-
Executes dropped EXE 1 IoCs
pid Process 1392 ChromeServices.exe -
Loads dropped DLL 3 IoCs
pid Process 2092 powershell.exe 2920 Process not Found 1392 ChromeServices.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeServices = "cmd.exe /C start \"\" /D \"C:\\Users\\Public\\Downloads\\ChromeServices\" \"C:\\Users\\Public\\Downloads\\ChromeServices\\ChromeServices.exe\"" powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1392 set thread context of 2504 1392 ChromeServices.exe 34 -
pid Process 2092 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2092 powershell.exe 2092 powershell.exe 2092 powershell.exe 2092 powershell.exe 2092 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2132 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 2504 AddInProcess32.exe Token: SeIncreaseQuotaPrivilege 2504 AddInProcess32.exe Token: SeSecurityPrivilege 2504 AddInProcess32.exe Token: SeTakeOwnershipPrivilege 2504 AddInProcess32.exe Token: SeLoadDriverPrivilege 2504 AddInProcess32.exe Token: SeSystemProfilePrivilege 2504 AddInProcess32.exe Token: SeSystemtimePrivilege 2504 AddInProcess32.exe Token: SeProfSingleProcessPrivilege 2504 AddInProcess32.exe Token: SeIncBasePriorityPrivilege 2504 AddInProcess32.exe Token: SeCreatePagefilePrivilege 2504 AddInProcess32.exe Token: SeBackupPrivilege 2504 AddInProcess32.exe Token: SeRestorePrivilege 2504 AddInProcess32.exe Token: SeShutdownPrivilege 2504 AddInProcess32.exe Token: SeDebugPrivilege 2504 AddInProcess32.exe Token: SeSystemEnvironmentPrivilege 2504 AddInProcess32.exe Token: SeRemoteShutdownPrivilege 2504 AddInProcess32.exe Token: SeUndockPrivilege 2504 AddInProcess32.exe Token: SeManageVolumePrivilege 2504 AddInProcess32.exe Token: 33 2504 AddInProcess32.exe Token: 34 2504 AddInProcess32.exe Token: 35 2504 AddInProcess32.exe Token: SeIncreaseQuotaPrivilege 2504 AddInProcess32.exe Token: SeSecurityPrivilege 2504 AddInProcess32.exe Token: SeTakeOwnershipPrivilege 2504 AddInProcess32.exe Token: SeLoadDriverPrivilege 2504 AddInProcess32.exe Token: SeSystemProfilePrivilege 2504 AddInProcess32.exe Token: SeSystemtimePrivilege 2504 AddInProcess32.exe Token: SeProfSingleProcessPrivilege 2504 AddInProcess32.exe Token: SeIncBasePriorityPrivilege 2504 AddInProcess32.exe Token: SeCreatePagefilePrivilege 2504 AddInProcess32.exe Token: SeBackupPrivilege 2504 AddInProcess32.exe Token: SeRestorePrivilege 2504 AddInProcess32.exe Token: SeShutdownPrivilege 2504 AddInProcess32.exe Token: SeDebugPrivilege 2504 AddInProcess32.exe Token: SeSystemEnvironmentPrivilege 2504 AddInProcess32.exe Token: SeRemoteShutdownPrivilege 2504 AddInProcess32.exe Token: SeUndockPrivilege 2504 AddInProcess32.exe Token: SeManageVolumePrivilege 2504 AddInProcess32.exe Token: 33 2504 AddInProcess32.exe Token: 34 2504 AddInProcess32.exe Token: 35 2504 AddInProcess32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2132 AcroRd32.exe 2132 AcroRd32.exe 2132 AcroRd32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2132 2092 powershell.exe 31 PID 2092 wrote to memory of 2132 2092 powershell.exe 31 PID 2092 wrote to memory of 2132 2092 powershell.exe 31 PID 2092 wrote to memory of 2132 2092 powershell.exe 31 PID 2092 wrote to memory of 1392 2092 powershell.exe 32 PID 2092 wrote to memory of 1392 2092 powershell.exe 32 PID 2092 wrote to memory of 1392 2092 powershell.exe 32 PID 1392 wrote to memory of 2504 1392 ChromeServices.exe 34 PID 1392 wrote to memory of 2504 1392 ChromeServices.exe 34 PID 1392 wrote to memory of 2504 1392 ChromeServices.exe 34 PID 1392 wrote to memory of 2504 1392 ChromeServices.exe 34 PID 1392 wrote to memory of 2504 1392 ChromeServices.exe 34 PID 1392 wrote to memory of 2504 1392 ChromeServices.exe 34 PID 1392 wrote to memory of 2504 1392 ChromeServices.exe 34 PID 1392 wrote to memory of 2504 1392 ChromeServices.exe 34 PID 1392 wrote to memory of 2504 1392 ChromeServices.exe 34
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\job.ps11⤵
- Loads dropped DLL
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Creative Brift Marketing Sneaker Daily Deal.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2132
-
-
C:\Users\Public\Downloads\ChromeServices\ChromeServices.exe"C:\Users\Public\Downloads\ChromeServices\ChromeServices.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58cdddd0a051c53d9e3bf4b28273f04bc
SHA111b5279d64dd614d3613899cfc8840a7fa12165c
SHA256d07a494c835c2a6d0f5ef9fb721050c7751358101f0422e4fce1af0680f21baf
SHA512b7b38f84c803e2b0e16c7a76b159ca415ea1465e1c9612c04b65f476855396ccc4b259019f604c9abe843a227e030008d61b06c8ce8bcf99abe0ce7659e66011
-
Filesize
91KB
MD5897417cce1edbd4222c6c8c5e0f1f7c8
SHA1c52b4982eecbcc5e5491fac2aaf4d2fbbda1335c
SHA25628b4bdc732553037551c304fe459634011011be7dcc4ed81979d4a07647e7cc8
SHA51263b484dfc9ecaa485c666ec463113e1a5fa608283e993a1761d1ed905634602090339e68ea9e87616ed7c3a645538ba0d9e50427e62a4b646558bc57122cd4e5
-
Filesize
3.0MB
MD5aab7a3b67b71bf0439627158323b502e
SHA1db7eae4731c4749d21c6cc54a364bcf20c04934c
SHA25639c9693c36f38a1b691eb3584c18f8550c08eb6a983c46cd46b476c8126ce8cc
SHA512543fbb82d5e73c3df0dd19f4b71a2c19b78b3250192be5c1191a0c4d53348ca84fd975dbc938226b67a1aab9dcdeb2aa16eb8c39982215aef2bb6f857f2cf162
-
Filesize
2.8MB
MD5ebcf17abb78a21d5f3904c00a60e1e0a
SHA1ec6525d3de6ebd4eedb8193707f24aba232581d7
SHA2561099a52ceec00e3db7f704c5f0cea8c23af02490ade25243b7c90f1e870c2614
SHA5125b965213f03406a22d9ffcfd18a716fee8851ca366960b888631f695fc74daf9dc33276004f00ef6df5ec5513a7409446d1104dbb3c872e614efbf2cdbd04fbd
-
Filesize
67KB
MD5d82b8f0cb601039af7c1968b0c92d09f
SHA1b0105f082e10791e6703abbc064904be073dc79b
SHA256962c0f879de9a12a78ea81536e7223ec7a7c8a9d5828871b6fdd26e649401755
SHA512be063f8590951e8d4b6f1e69cac57a95d90d3ab96576545afe4141979d376c322047d0b73169140b22ef6d24a7e9c5b4fe09771a4fedfd36ce544befafa65e33