Analysis

  • max time kernel
    30s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2025, 02:55

General

  • Target

    80f34efce3765a4e57c2f333981112bff3788633bd515fa48b6eb16b88113660.exe

  • Size

    320KB

  • MD5

    1b8dac31eb30bd909fadcd9738c832ca

  • SHA1

    3d5021b656dcb39863d39430a4eddb5d6eb0e177

  • SHA256

    80f34efce3765a4e57c2f333981112bff3788633bd515fa48b6eb16b88113660

  • SHA512

    25b02e6ae62add0a550b6c6cf3b1506177012ff94d885f0773fe5a7554d1fee1c96c3f286d6728eae31249eacbfc26d4869633145ba48ff3e6cef54ae8a9e54a

  • SSDEEP

    6144:3m/Q1Q5Ng68j/svmHC40+XIzFUygWK0tWrcBOvv:3m/Q6P8j/svm1TXI5tZB

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 4 IoCs
  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80f34efce3765a4e57c2f333981112bff3788633bd515fa48b6eb16b88113660.exe
    "C:\Users\Admin\AppData\Local\Temp\80f34efce3765a4e57c2f333981112bff3788633bd515fa48b6eb16b88113660.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • outlook_office_path
    • outlook_win_path
    PID:2104

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\BCXRJFKE\Browsers\Firefox\Bookmarks.txt

          Filesize

          105B

          MD5

          2e9d094dda5cdc3ce6519f75943a4ff4

          SHA1

          5d989b4ac8b699781681fe75ed9ef98191a5096c

          SHA256

          c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

          SHA512

          d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Desktop\RepairDismount.rtf

          Filesize

          863KB

          MD5

          fe6559c2060cd952a14fa275d4635589

          SHA1

          65600718059562c616e451330a262eb7abb1a187

          SHA256

          1a47a85170c69e4c13a0e7db31dc88876eef2384b7545099b31c00e426736d91

          SHA512

          d72fa355e4d885bf84fef97202a978f136721853b7be388570363a1ea30260517b9c5a69a2151599527ccd90508c30b990e2b4ea23fa9390c01d654470388e15

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Desktop\SkipBlock.css

          Filesize

          546KB

          MD5

          91b3c27dc43b02b6b47049a1d41592ea

          SHA1

          ba492b4ec36b4b1b8322e9d164afd29a3529d579

          SHA256

          479de4ba2e0e3ac5e006f75e7f49d56abdd9d7d70351b08826ffe34933e7a9e5

          SHA512

          2cfba7691296c2c8d4c1573d9a306494831c639d36dbe30eee68f2c77ff6d94067ee0131e953e9211dc612db5b33804acc09b2fff3c0301b9b34544857e2d9ae

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Documents\NewConnect.doc

          Filesize

          671KB

          MD5

          b3ed3dbb3e92b549b519b0e8aad3da14

          SHA1

          115f36e841ce12b9fb40ef257b749570c2c74ad4

          SHA256

          6046891adce74a2b0b38ff356d13b50438f1964cf9360ed2efe0a893a2513451

          SHA512

          7c46819f54b1b5bc5fb0ae43fc068f04ce7b83655a9443af7be9d426cf1650a7dff1cdce69b85e4a6fb0fd22e59a1dfb746a92655fc4e692c955e1906a17d1f0

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Documents\PublishMove.doc

          Filesize

          170KB

          MD5

          a743333b6d1d77d176581bc3eaad05e9

          SHA1

          886da3881fd19d2fa2d93b15c005d33f52b99a17

          SHA256

          5cc672ba75e1f2df7a0007c0548e31b5653436d14423d90753331d7766f03dbb

          SHA512

          6bd1ea2739d81226abfdd6df64298e08a5fb11fc1422a1404fd5ded208b5258dbf679777b859f9a144cb5bd36a624e86c1156721b6789c9ed0791468b3bea0af

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Documents\PublishRepair.docx

          Filesize

          216KB

          MD5

          c1738d207862edef2504e1715bea2edd

          SHA1

          8111846072ba446450f43cdb557f016c58ca88a3

          SHA256

          126cf8c6e7c0038dea9be07861129bcf4144e1027ad3e7da29f4284dd57c5f44

          SHA512

          53a987bb460c2f34f0d59f8f554a9a4f16966a0e40730cb23699e9728ac75b87944095f078a825d2625205c0bd5c0decee715fc27fd37400ccd7053718aeb09e

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Documents\RevokeExit.html

          Filesize

          182KB

          MD5

          d9442ab31581bdaf909adbab59ef5be6

          SHA1

          0f0e4da94019b1108209cfbb2d1fcfdb46534b6a

          SHA256

          6edcb3056c431af02c8e1305fb1827be2e365a5de619dab998cc334ef543a201

          SHA512

          09874d6049b5b317b7a2a64b58a1403dc7c3f078b863d17bc1c8577222815485b081e6d48c8d966b5da1689d832cdf37a26984c502adb838debafc9cef58b82f

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Downloads\CheckpointMount.bmp

          Filesize

          506KB

          MD5

          e60e3e751bad7b2033581c6d8fd48aeb

          SHA1

          249acc4ac0f547274f1264cdf97fcb17449ec783

          SHA256

          8f36e3a6332678dc3549dae6187890abbc9fe4aca15bdf7c5dc1f7819b8cd6ca

          SHA512

          b987dac605e1a56f829381c9224a1e6421d1554bbdf9287213ccaf074913936dace0c78458545204b8fad4b7e50ff20f168f8413503bf00725a475094f7b9a37

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Downloads\MeasureReceive.jpeg

          Filesize

          610KB

          MD5

          a7565b16ebc026a3c0a5e65e53d95d28

          SHA1

          6c1700d4e95fd105c7f08e8543811ca115adf01e

          SHA256

          be069e3d31b6126d78bd733d8824b4093f9813755de7d7fe0fee268fbdd80c59

          SHA512

          52a752487c09a2993b70bec2db054217bfe543d19185ab0060b5884a94190a514b0d17d84fd90c42c5b5aee9acb71463ffba28b167248b345a3fd2d8652f241e

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Downloads\ProtectPublish.docx

          Filesize

          774KB

          MD5

          56c4dabfb656e37403d7a8cdf228e268

          SHA1

          c26f7cb7c93238e08c9a7cac2f16574e12095b4f

          SHA256

          cd9c87bc81ef3b1e4ee9ef116a1e927e58bfcf0f127b70308f093266096ff72c

          SHA512

          b1ebfbb32139e9e6fa04e389cdd45de2c144b64b838f564d71e94c32433e34fc74376670112b1ad30917e240a270b2bbe40ef8ae0ec14f7c5c7d0512468b67da

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Pictures\DisableExit.png

          Filesize

          179KB

          MD5

          82d6d5cf37b1c2e09123db540bba49ca

          SHA1

          e758a08e53804d44fac45d811bf77c336456cc04

          SHA256

          c05ab1e47f455dd8699ac55a6d8584eaad75bd8a34df76d6b25f6aa80377eba0

          SHA512

          25cda6d65414a352efdedae983bb15da83e1870b2c232f0e72a4d198963a9eddb5907395146bcf7922d5fe271de542cb475f537c6972e4e74c8730bf3b85e588

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Pictures\DismountSelect.jpeg

          Filesize

          346KB

          MD5

          061cbe227921ff0ada60a401f1a14360

          SHA1

          5d8887029312b116b57c33054a9c9c3015e4427f

          SHA256

          2de9625c1c6d4a2e002df8236c72cd82354c89c6cb294f41e4df3b24d25f5e0e

          SHA512

          9a91a0d15eac9313a6961fed56d1298bb3def5a6eacdc414876b1b6284d11bf70d423f772aabf339582d9bdc8028b4581cdc67fcd4d7520144f67847c51847b5

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Pictures\JoinUnregister.svg

          Filesize

          296KB

          MD5

          0a0b0182c6d4c65f21f6d4166b7f5e22

          SHA1

          d7be483a0c6d35efde3c1416893d842889c31683

          SHA256

          1c386b3f401cff15c40f85f17db7621f068bdabc05a16137856d7fb2ec4bba89

          SHA512

          028bd691427699e86a6885b50815faa0a259aab6381a149c5c36b5b5de7460abea079aeac110ce2a398654342289c1049fdf82e0363edef418b2932524159a79

        • C:\Users\Admin\AppData\Local\BCXRJFKE\FileGrabber\Pictures\RedoStop.bmp

          Filesize

          405KB

          MD5

          75ef36f3e55b9fa2739aa9dd04facebf

          SHA1

          75e444eead01c6b60ae4f4a188bea284cbcb798a

          SHA256

          23dcb8cd28d037d00a1ad33a8d48990afaf1e213e6113d3c936d81227404f43d

          SHA512

          841bd8f153d56073fe070de7861eea76f33485d49d9de716595d4c3987c0c558b817a53beeb4f54a80bfe5bc576ffee7212d442c32d5f28f52483739cddfe9e0

        • memory/2104-86-0x00000000743A0000-0x0000000074A8E000-memory.dmp

          Filesize

          6.9MB

        • memory/2104-85-0x00000000743AE000-0x00000000743AF000-memory.dmp

          Filesize

          4KB

        • memory/2104-2-0x00000000743A0000-0x0000000074A8E000-memory.dmp

          Filesize

          6.9MB

        • memory/2104-1-0x00000000000C0000-0x0000000000116000-memory.dmp

          Filesize

          344KB

        • memory/2104-0-0x00000000743AE000-0x00000000743AF000-memory.dmp

          Filesize

          4KB

        • memory/2104-216-0x00000000743A0000-0x0000000074A8E000-memory.dmp

          Filesize

          6.9MB