Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 10:06
Static task
static1
Behavioral task
behavioral1
Sample
bc7EKCf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc7EKCf.exe
Resource
win10v2004-20241007-en
General
-
Target
bc7EKCf.exe
-
Size
2.9MB
-
MD5
c042e73bc713b483058772dabf080733
-
SHA1
06f64d679249be4d555fc81e495b871b09b98976
-
SHA256
01dc20c640b1a5d41354f57e06b324ff2a5753cd1ef98c5f5773c5475284e27d
-
SHA512
a019c0fa3dd6f179fe748a33aa4f5e62197b232cadca5b481fbb75688ec81dd1b78c7ddd3e64744f7ffca6b578a26382b66ca3982e394b1c61412193c1eaf98f
-
SSDEEP
49152:XTPo/58bWNrFMnwfHvo1FyeOhJG0BNpBtDmMT2N1a3wc2zmHayHNABEc4v0OqMPE:XzoBG+FMwfP6FyTiipHaMT2ukAtUFL4J
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 5 IoCs
resource yara_rule behavioral1/memory/2824-17-0x0000000000400000-0x0000000000694000-memory.dmp family_stormkitty behavioral1/memory/2824-15-0x0000000000400000-0x0000000000694000-memory.dmp family_stormkitty behavioral1/memory/2824-12-0x0000000000400000-0x0000000000694000-memory.dmp family_stormkitty behavioral1/memory/2824-9-0x0000000000400000-0x0000000000694000-memory.dmp family_stormkitty behavioral1/memory/2824-8-0x0000000000400000-0x0000000000694000-memory.dmp family_stormkitty -
Stormkitty family
-
Deletes itself 1 IoCs
pid Process 2096 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bc7EKCf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 bc7EKCf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2824 2280 bc7EKCf.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc7EKCf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc7EKCf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1432 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 1904 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2280 bc7EKCf.exe 2280 bc7EKCf.exe 2824 bc7EKCf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2280 bc7EKCf.exe Token: SeDebugPrivilege 2824 bc7EKCf.exe Token: SeDebugPrivilege 1904 taskkill.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2824 2280 bc7EKCf.exe 31 PID 2280 wrote to memory of 2824 2280 bc7EKCf.exe 31 PID 2280 wrote to memory of 2824 2280 bc7EKCf.exe 31 PID 2280 wrote to memory of 2824 2280 bc7EKCf.exe 31 PID 2280 wrote to memory of 2824 2280 bc7EKCf.exe 31 PID 2280 wrote to memory of 2824 2280 bc7EKCf.exe 31 PID 2280 wrote to memory of 2824 2280 bc7EKCf.exe 31 PID 2280 wrote to memory of 2824 2280 bc7EKCf.exe 31 PID 2280 wrote to memory of 2824 2280 bc7EKCf.exe 31 PID 2824 wrote to memory of 2096 2824 bc7EKCf.exe 32 PID 2824 wrote to memory of 2096 2824 bc7EKCf.exe 32 PID 2824 wrote to memory of 2096 2824 bc7EKCf.exe 32 PID 2824 wrote to memory of 2096 2824 bc7EKCf.exe 32 PID 2096 wrote to memory of 2428 2096 cmd.exe 34 PID 2096 wrote to memory of 2428 2096 cmd.exe 34 PID 2096 wrote to memory of 2428 2096 cmd.exe 34 PID 2096 wrote to memory of 2428 2096 cmd.exe 34 PID 2096 wrote to memory of 1904 2096 cmd.exe 35 PID 2096 wrote to memory of 1904 2096 cmd.exe 35 PID 2096 wrote to memory of 1904 2096 cmd.exe 35 PID 2096 wrote to memory of 1904 2096 cmd.exe 35 PID 2096 wrote to memory of 1432 2096 cmd.exe 36 PID 2096 wrote to memory of 1432 2096 cmd.exe 36 PID 2096 wrote to memory of 1432 2096 cmd.exe 36 PID 2096 wrote to memory of 1432 2096 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc7EKCf.exe"C:\Users\Admin\AppData\Local\Temp\bc7EKCf.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\bc7EKCf.exe"C:\Users\Admin\AppData\Local\Temp\bc7EKCf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tmp9675.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp9675.tmp.bat"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /PID 28244⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak4⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1432
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115B
MD5e3935b0884a9a6c97bd0d2d5b0a842cd
SHA183cf76974a715a2353d6a516cc89e8747057ec3f
SHA256873ffabdc883ba4c0fbb09f7bb2913fb023e7a42cf1ff6ae3847fa2a84b63b94
SHA512c66e1e33d57852e69b982bbf83f76e48c8c34837d196c7cb6694d4ccedd41350191479d21df14f82f0ed84cca17428a53c86ce2c62554d4a0f1bd3955f545d51