Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 19:23
Behavioral task
behavioral1
Sample
Yandex.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Yandex.exe
Resource
win10v2004-20241007-en
General
-
Target
Yandex.exe
-
Size
316KB
-
MD5
74a53d4f5be3be53932f861a212b4120
-
SHA1
7ef1acc4dc0f5cd6941d2ca38defdaa3c03d077f
-
SHA256
f6a0a04cd3557910ae08dab46f00c96c83579de7716e925b533c25162ff2de88
-
SHA512
9e90b258ea794bb5c4a2c1608afedc39a2c0e98b66d8f930c6b509d147c79621ba6664f57ee862572deebb50c67f7bcd077062b5ce8ba33f98e417ec37250b65
-
SSDEEP
6144:t+Vr2RFMVrqcinHAWnVjpTaB822Z9rra97TQLwtI6TS:hRQrqXZVIaE9ewtjS
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2172-1-0x0000000000F70000-0x0000000000FBE000-memory.dmp family_stormkitty -
Stormkitty family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Yandex.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Yandex.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2172 Yandex.exe 2172 Yandex.exe 2172 Yandex.exe 2172 Yandex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 Yandex.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2900 2172 Yandex.exe 32 PID 2172 wrote to memory of 2900 2172 Yandex.exe 32 PID 2172 wrote to memory of 2900 2172 Yandex.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Yandex.exe"C:\Users\Admin\AppData\Local\Temp\Yandex.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2172 -s 8602⤵PID:2900
-