Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
Creative_Brift_Marketing/Creative Brift Marketing Sneaker Daily Deal (6 month plan).lnk
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Creative_Brift_Marketing/Creative Brift Marketing Sneaker Daily Deal (6 month plan).lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Creative_Brift_Marketing/Potential products want to increase sales/job.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Creative_Brift_Marketing/Potential products want to increase sales/job.ps1
Resource
win10v2004-20241007-en
General
-
Target
Creative_Brift_Marketing/Potential products want to increase sales/job.ps1
-
Size
30.6MB
-
MD5
f01f7141f5dcb2161ee0701949f91e70
-
SHA1
28d2427ee1cd5f4c2a17f020bfaea95daece07d6
-
SHA256
68225e21f08b08bd1890e8e0a5d1b379cd9692a2c4a43bffd7ea6bee5e5b409d
-
SHA512
6cd177e2d4b385365eb9f549d2f869f1a40483e1c8a4fe0655146c7ca28090cdf14ac9c2a8a1cb7c385f6f824fe2da422b1714cb2ca851a0d1a18cb3be2a31e1
-
SSDEEP
49152:/0p9Wz0S8ygXipUpxf2H21a1RFvpB8ciXBXsdO6QKUP+Vzfcw3S6T3G4n/1kbC9z:5
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral3/memory/1856-51-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty behavioral3/memory/1856-53-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty behavioral3/memory/1856-52-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
resource yara_rule behavioral3/memory/1856-51-0x0000000000400000-0x0000000000704000-memory.dmp VenomRAT behavioral3/memory/1856-53-0x0000000000400000-0x0000000000704000-memory.dmp VenomRAT behavioral3/memory/1856-52-0x0000000000400000-0x0000000000704000-memory.dmp VenomRAT -
Venomrat family
-
Executes dropped EXE 1 IoCs
pid Process 716 ChromeServices.exe -
Loads dropped DLL 3 IoCs
pid Process 2104 powershell.exe 856 Process not Found 716 ChromeServices.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeServices = "cmd.exe /C start \"\" /D \"C:\\Users\\Public\\Downloads\\ChromeServices\" \"C:\\Users\\Public\\Downloads\\ChromeServices\\ChromeServices.exe\"" powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 716 set thread context of 1856 716 ChromeServices.exe 34 -
pid Process 2104 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2104 powershell.exe 2104 powershell.exe 2104 powershell.exe 2104 powershell.exe 2104 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2104 powershell.exe Token: SeDebugPrivilege 1856 AddInProcess32.exe Token: SeIncreaseQuotaPrivilege 1856 AddInProcess32.exe Token: SeSecurityPrivilege 1856 AddInProcess32.exe Token: SeTakeOwnershipPrivilege 1856 AddInProcess32.exe Token: SeLoadDriverPrivilege 1856 AddInProcess32.exe Token: SeSystemProfilePrivilege 1856 AddInProcess32.exe Token: SeSystemtimePrivilege 1856 AddInProcess32.exe Token: SeProfSingleProcessPrivilege 1856 AddInProcess32.exe Token: SeIncBasePriorityPrivilege 1856 AddInProcess32.exe Token: SeCreatePagefilePrivilege 1856 AddInProcess32.exe Token: SeBackupPrivilege 1856 AddInProcess32.exe Token: SeRestorePrivilege 1856 AddInProcess32.exe Token: SeShutdownPrivilege 1856 AddInProcess32.exe Token: SeDebugPrivilege 1856 AddInProcess32.exe Token: SeSystemEnvironmentPrivilege 1856 AddInProcess32.exe Token: SeRemoteShutdownPrivilege 1856 AddInProcess32.exe Token: SeUndockPrivilege 1856 AddInProcess32.exe Token: SeManageVolumePrivilege 1856 AddInProcess32.exe Token: 33 1856 AddInProcess32.exe Token: 34 1856 AddInProcess32.exe Token: 35 1856 AddInProcess32.exe Token: SeIncreaseQuotaPrivilege 1856 AddInProcess32.exe Token: SeSecurityPrivilege 1856 AddInProcess32.exe Token: SeTakeOwnershipPrivilege 1856 AddInProcess32.exe Token: SeLoadDriverPrivilege 1856 AddInProcess32.exe Token: SeSystemProfilePrivilege 1856 AddInProcess32.exe Token: SeSystemtimePrivilege 1856 AddInProcess32.exe Token: SeProfSingleProcessPrivilege 1856 AddInProcess32.exe Token: SeIncBasePriorityPrivilege 1856 AddInProcess32.exe Token: SeCreatePagefilePrivilege 1856 AddInProcess32.exe Token: SeBackupPrivilege 1856 AddInProcess32.exe Token: SeRestorePrivilege 1856 AddInProcess32.exe Token: SeShutdownPrivilege 1856 AddInProcess32.exe Token: SeDebugPrivilege 1856 AddInProcess32.exe Token: SeSystemEnvironmentPrivilege 1856 AddInProcess32.exe Token: SeRemoteShutdownPrivilege 1856 AddInProcess32.exe Token: SeUndockPrivilege 1856 AddInProcess32.exe Token: SeManageVolumePrivilege 1856 AddInProcess32.exe Token: 33 1856 AddInProcess32.exe Token: 34 1856 AddInProcess32.exe Token: 35 1856 AddInProcess32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2864 AcroRd32.exe 2864 AcroRd32.exe 2864 AcroRd32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2864 2104 powershell.exe 31 PID 2104 wrote to memory of 2864 2104 powershell.exe 31 PID 2104 wrote to memory of 2864 2104 powershell.exe 31 PID 2104 wrote to memory of 2864 2104 powershell.exe 31 PID 2104 wrote to memory of 716 2104 powershell.exe 32 PID 2104 wrote to memory of 716 2104 powershell.exe 32 PID 2104 wrote to memory of 716 2104 powershell.exe 32 PID 716 wrote to memory of 1856 716 ChromeServices.exe 34 PID 716 wrote to memory of 1856 716 ChromeServices.exe 34 PID 716 wrote to memory of 1856 716 ChromeServices.exe 34 PID 716 wrote to memory of 1856 716 ChromeServices.exe 34 PID 716 wrote to memory of 1856 716 ChromeServices.exe 34 PID 716 wrote to memory of 1856 716 ChromeServices.exe 34 PID 716 wrote to memory of 1856 716 ChromeServices.exe 34 PID 716 wrote to memory of 1856 716 ChromeServices.exe 34 PID 716 wrote to memory of 1856 716 ChromeServices.exe 34
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\Creative_Brift_Marketing\Potential products want to increase sales\job.ps1"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Creative Brift Marketing Sneaker Daily Deal.pdf"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
C:\Users\Public\Downloads\ChromeServices\ChromeServices.exe"C:\Users\Public\Downloads\ChromeServices\ChromeServices.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f13f7c4da229395b38df2b2541c5321b
SHA1593ab58cd322a9ec8cf19595690b2cf571e36849
SHA256787f603395e3cd7b5754de060f7bc1b00a23dd9ee709f96817ea0c185bbb9b20
SHA5120388b1cf566a7c82170b7762443c4148840be1a2278c48663eef9b9c20a867a77a8d0a32cf3cdb5aa3f2b2ec229e62b917e8b6eef631ce7eb7da25a34c4a1670
-
Filesize
91KB
MD5897417cce1edbd4222c6c8c5e0f1f7c8
SHA1c52b4982eecbcc5e5491fac2aaf4d2fbbda1335c
SHA25628b4bdc732553037551c304fe459634011011be7dcc4ed81979d4a07647e7cc8
SHA51263b484dfc9ecaa485c666ec463113e1a5fa608283e993a1761d1ed905634602090339e68ea9e87616ed7c3a645538ba0d9e50427e62a4b646558bc57122cd4e5
-
Filesize
3.0MB
MD5aab7a3b67b71bf0439627158323b502e
SHA1db7eae4731c4749d21c6cc54a364bcf20c04934c
SHA25639c9693c36f38a1b691eb3584c18f8550c08eb6a983c46cd46b476c8126ce8cc
SHA512543fbb82d5e73c3df0dd19f4b71a2c19b78b3250192be5c1191a0c4d53348ca84fd975dbc938226b67a1aab9dcdeb2aa16eb8c39982215aef2bb6f857f2cf162
-
Filesize
67KB
MD5d82b8f0cb601039af7c1968b0c92d09f
SHA1b0105f082e10791e6703abbc064904be073dc79b
SHA256962c0f879de9a12a78ea81536e7223ec7a7c8a9d5828871b6fdd26e649401755
SHA512be063f8590951e8d4b6f1e69cac57a95d90d3ab96576545afe4141979d376c322047d0b73169140b22ef6d24a7e9c5b4fe09771a4fedfd36ce544befafa65e33
-
Filesize
2.8MB
MD5ebcf17abb78a21d5f3904c00a60e1e0a
SHA1ec6525d3de6ebd4eedb8193707f24aba232581d7
SHA2561099a52ceec00e3db7f704c5f0cea8c23af02490ade25243b7c90f1e870c2614
SHA5125b965213f03406a22d9ffcfd18a716fee8851ca366960b888631f695fc74daf9dc33276004f00ef6df5ec5513a7409446d1104dbb3c872e614efbf2cdbd04fbd