Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 15:45
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10v2004-20250207-en
General
-
Target
random.exe
-
Size
6.1MB
-
MD5
113461458c920597c8529c301de52645
-
SHA1
c55d0860598fcb41cbe46431b431713c58b7608e
-
SHA256
7266a6dc1df61156179dbe47ebdebeec58a102424b2d810c5dd4986a3ea4d61c
-
SHA512
cdf4749ca7f39fd33ddc36ca3da9425acf303e111919020c35c23e702e51747bb7de70475e61199eea66998556968d928bdcda9f898688c9d8925805316cd1a1
-
SSDEEP
196608:4Vrk/RaXt4S0LHYaTSxyVrk/RaXt4S0LHYaTSxM:4BC8a0hcBC8a0hK
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4704-5-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/5100-1-0x00000000009A0000-0x0000000000FB6000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5100 set thread context of 4704 5100 random.exe 79 -
Program crash 2 IoCs
pid pid_target Process procid_target 4380 5100 WerFault.exe 78 3028 4704 WerFault.exe 79 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4896 MicrosoftEdgeUpdate.exe 4896 MicrosoftEdgeUpdate.exe 4896 MicrosoftEdgeUpdate.exe 4896 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 4704 random.exe Token: SeIncreaseQuotaPrivilege 4704 random.exe Token: SeSecurityPrivilege 4704 random.exe Token: SeTakeOwnershipPrivilege 4704 random.exe Token: SeLoadDriverPrivilege 4704 random.exe Token: SeSystemProfilePrivilege 4704 random.exe Token: SeSystemtimePrivilege 4704 random.exe Token: SeProfSingleProcessPrivilege 4704 random.exe Token: SeIncBasePriorityPrivilege 4704 random.exe Token: SeCreatePagefilePrivilege 4704 random.exe Token: SeBackupPrivilege 4704 random.exe Token: SeRestorePrivilege 4704 random.exe Token: SeShutdownPrivilege 4704 random.exe Token: SeDebugPrivilege 4704 random.exe Token: SeSystemEnvironmentPrivilege 4704 random.exe Token: SeRemoteShutdownPrivilege 4704 random.exe Token: SeUndockPrivilege 4704 random.exe Token: SeManageVolumePrivilege 4704 random.exe Token: 33 4704 random.exe Token: 34 4704 random.exe Token: 35 4704 random.exe Token: 36 4704 random.exe Token: SeIncreaseQuotaPrivilege 4704 random.exe Token: SeSecurityPrivilege 4704 random.exe Token: SeTakeOwnershipPrivilege 4704 random.exe Token: SeLoadDriverPrivilege 4704 random.exe Token: SeSystemProfilePrivilege 4704 random.exe Token: SeSystemtimePrivilege 4704 random.exe Token: SeProfSingleProcessPrivilege 4704 random.exe Token: SeIncBasePriorityPrivilege 4704 random.exe Token: SeCreatePagefilePrivilege 4704 random.exe Token: SeBackupPrivilege 4704 random.exe Token: SeRestorePrivilege 4704 random.exe Token: SeShutdownPrivilege 4704 random.exe Token: SeDebugPrivilege 4704 random.exe Token: SeSystemEnvironmentPrivilege 4704 random.exe Token: SeRemoteShutdownPrivilege 4704 random.exe Token: SeUndockPrivilege 4704 random.exe Token: SeManageVolumePrivilege 4704 random.exe Token: 33 4704 random.exe Token: 34 4704 random.exe Token: 35 4704 random.exe Token: 36 4704 random.exe Token: SeDebugPrivilege 4896 MicrosoftEdgeUpdate.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5100 wrote to memory of 4704 5100 random.exe 79 PID 5100 wrote to memory of 4704 5100 random.exe 79 PID 5100 wrote to memory of 4704 5100 random.exe 79 PID 5100 wrote to memory of 4704 5100 random.exe 79 PID 5100 wrote to memory of 4704 5100 random.exe 79 PID 5100 wrote to memory of 4704 5100 random.exe 79 PID 5100 wrote to memory of 4704 5100 random.exe 79 PID 5100 wrote to memory of 4704 5100 random.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 13523⤵
- Program crash
PID:3028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 8402⤵
- Program crash
PID:4380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5100 -ip 51001⤵PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4704 -ip 47041⤵PID:1592
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896