Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2025 22:49

General

  • Target

    a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f.exe

  • Size

    1.1MB

  • MD5

    0ecbbe374de3cdc237c2cc469ffa2274

  • SHA1

    fff64c336d813e1181bbc664ca29b23f7eb6c359

  • SHA256

    a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f

  • SHA512

    74fee3a93398d6da6d862f116b6b70634d9221bdc46d06193103831a2b82f54589bbebc58a3f075627c27fa5367fd1a0fe2f441cfbd6125ef44963391518d9ab

  • SSDEEP

    24576:CUSNXaV9x4IUgs36BUI2So5+jnzFoCaGApu8K:C90T+Sk6BU7HIFo7G98K

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f.exe
    "C:\Users\Admin\AppData\Local\Temp\a7c40b126375808dd70a9e69da9ac8b494b6de4439ae2e18fad52ff1f6b1fd2f.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\passwords.txt

    Filesize

    1B

    MD5

    68b329da9893e34099c7d8ad5cb9c940

    SHA1

    adc83b19e793491b1c6ea0fd8b46cd9f32e592fc

    SHA256

    01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b

    SHA512

    be688838ca8686e5c90689bf2ab585cef1137c999b48c70b92f67a5c34dc15697b5d11c982ed6d71be1e1e7f7b4e0733884aa97c3f7a339a8ed03577cf74be09

  • memory/1372-0-0x00007FFEE6C33000-0x00007FFEE6C35000-memory.dmp

    Filesize

    8KB

  • memory/1372-1-0x00000000001D0000-0x00000000002EC000-memory.dmp

    Filesize

    1.1MB

  • memory/1372-2-0x0000000000C60000-0x0000000000C6A000-memory.dmp

    Filesize

    40KB

  • memory/1372-3-0x00000000025C0000-0x00000000025DA000-memory.dmp

    Filesize

    104KB

  • memory/1372-4-0x00007FFEE6C30000-0x00007FFEE76F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1372-19-0x000000001AF50000-0x000000001AF62000-memory.dmp

    Filesize

    72KB

  • memory/1372-20-0x000000001C130000-0x000000001C16C000-memory.dmp

    Filesize

    240KB

  • memory/1372-22-0x00007FFEE6C30000-0x00007FFEE76F1000-memory.dmp

    Filesize

    10.8MB