Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-02-2025 03:39
Behavioral task
behavioral1
Sample
8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe
Resource
win10v2004-20250207-en
General
-
Target
8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe
-
Size
3.5MB
-
MD5
bc94fb14f22e7bdd8925899e3df74a9a
-
SHA1
2f9766d357e3b4769e211d0b78ddcb63c4665a9a
-
SHA256
8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55
-
SHA512
01fdc03786790f24de77ead2755b598fbf5508f416f145a65c43ebbb12e6567dd5a9cb4c583fc4dccd271cd14c2eb9a88d4f6c55591525ec884c2f138e350254
-
SSDEEP
49152:0I4JBgBnW/0bDlCv2smtkHbtnWYbRyU8jaQmJ2ip0goEfCTEYClGWS1bQIRMgpN4:07JF24DmIbtF69mJ2ip0EfxFlGHdRMG
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral1/memory/1876-28-0x0000000000400000-0x0000000000D70000-memory.dmp family_stormkitty behavioral1/memory/1876-29-0x0000000000400000-0x0000000000D70000-memory.dmp family_stormkitty behavioral1/memory/1876-237-0x0000000000400000-0x0000000000D70000-memory.dmp family_stormkitty -
Stormkitty family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1876-28-0x0000000000400000-0x0000000000D70000-memory.dmp themida behavioral1/memory/1876-29-0x0000000000400000-0x0000000000D70000-memory.dmp themida behavioral1/memory/1876-237-0x0000000000400000-0x0000000000D70000-memory.dmp themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\VORHPBAB\FileGrabber\Desktop\desktop.ini 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe File created C:\Users\Admin\AppData\Local\VORHPBAB\FileGrabber\Documents\desktop.ini 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe File created C:\Users\Admin\AppData\Local\VORHPBAB\FileGrabber\Downloads\desktop.ini 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe File created C:\Users\Admin\AppData\Local\VORHPBAB\FileGrabber\Pictures\desktop.ini 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 freegeoip.app 18 api.ipify.org 19 api.ipify.org 20 ip-api.com 22 api.ipify.org 23 api.ipify.org 5 freegeoip.app -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1876 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1876 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe 1876 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe 1876 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe 1876 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe 1876 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe 1876 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe 1876 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1876 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe"C:\Users\Admin\AppData\Local\Temp\8bcfd81ccfc02af640a747e29cca4b8eacca82bf4961c808b6cbebe2619d0a55.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Accesses Microsoft Outlook profiles
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1876
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD550273765d6ae75f3fb74a48335716301
SHA16de69452fcdc17e5ceb4a32dbb693a1fa46fb51f
SHA256a7a55181464d787cd64138f588c5362a19136065ea6d8b3384a838176a88f6b0
SHA512b0e2575e3e0ea9f6e990a94b5726649a17079e2aa92b5050363be800ec2c72711a8d23dc94ca2523a9e91876cc39b7ed916dfe6227f68391247903789c795f72
-
Filesize
1.5MB
MD5c473378928db36995de6f1b87268cc33
SHA158e0bbe4671f174f6d0d47efda037db8f5545e1e
SHA25684f6bba7992f93c642b8e8580ce81427faa9546c9621720cc4d9f74975e33ea1
SHA512f4e526f2f48e9eccc0cd09f217cdba81ea2bb8ca7498db44e947ac2cdc76e20bfa1a6ade46e19a2238b35d13d5bdf8b6eeafb1c07fc54a9b726684050ee1029b
-
Filesize
423KB
MD54f1f5901dddb757a5edc7e4ea1ef02f0
SHA11f49093fa0e8cba82f11369c98e7a81a78209617
SHA25638200a9f67304454a4742b9ce5f299b42f25ebddcdc0abd544a8e9d2b3ef0f5e
SHA512b32ec089e30a3ff344eb37b1481e7a35112b710ac5feb856a927b74e014c9c57de886ccb80c38150914132c57a8f83a8b7303113b7f72078d75e21b1c7d962a1
-
Filesize
628KB
MD5d0f64ca2a3c8a01432ff3800e02136cb
SHA11666fcb54691033ded4aec4c787f6b16f2c5d4ab
SHA256c6b547a1a6185f663637b95944cb728a38404ff90edcd21409138a8178ad9b7a
SHA512907d6d5c2d6418b5ffdbd93026ca01ebb0556c47132b5e15fea1f3f5eeeb9b0292030bef20a935b67f8d9e28fcd50133bf0b220e79ecfd4624d7343d327da7ca
-
Filesize
1.1MB
MD56cbfdd61af30076f48d7c53c451b2097
SHA1b1d218813f6149f024773e8ad971cf827f582052
SHA2568b6bf0a00412c0dc55373c71e576646efe3fbe37de569d35ef5d6207ebf21e1e
SHA5125fd8900ad50708d33b882eb32cfcd4c24a93c54a5536c1181b301028adf6042f5b9e9816c9a255516efbeba8d0831a88d3b5224e830425c4eedaf4ca04c4afe3
-
Filesize
348KB
MD5dd9265bf15a94a7a6af6629aaeae0f1e
SHA1bc112a8f83c1333e595c19018385c160e2ba69d7
SHA256e41feabf3d6a66519c8ee66127afb594cba5c365e484e31d56ef8e375bbb1e8a
SHA512f03649afe22a5ab5c00459a706b5d1cd6da227f2d7413ff9f04111730dbc660e553cd8ed1e52d97e0e88886d728dc8d109b97d75d1676f10d61d15319af32212
-
Filesize
333KB
MD52c592497d22317b70f9cccfecdcd63c1
SHA1399954a9b990cb16c2bcf75316ae7985c7fff5e1
SHA2569a5aa506843493bc9fb24c9e056215ede27b0f1b7a5c0a172aff0ed0639b701a
SHA5127091efb64132be3f2e342a2a2374dec01fe6c00396820b9e185b9084a4675ea89256075484d048739185dfaeafe443a24716a7ba7c82fecb26e6c25ccb522b8f
-
Filesize
589KB
MD51b771dd56cbd37e8cfa72347e343517a
SHA17aad1fe5aa100f61e95f92745c925a6f61cb053a
SHA256d1f8340908719a3592348c60c433486ec8b2c68785a10a81bd2ad7a1a4d7127e
SHA512091c9741bafee6e8492aded1df82f8d600a1ee5c51f539e3407c7fd0a752b3c41ac0886bc61f7ed10373388bcd942a753b6e0129a71f8aefc5488d240dc3107b
-
Filesize
466KB
MD5bc77599517a0b1f84849ae9640c71dcb
SHA1e60ec0fc3745667c73dedcc1963c1803a1f93326
SHA25686e63e6e4cc39c9e5f86c1cfd5f867598a0b74b16153078becb8cf3aeef3dce2
SHA51237ab6e5b89e138dc104b9990d42844e5262b84da5702400f1e79f7b2f50a9d6a0ef7af2ebc1ee87452c7f66972ff1a47094828f8d04e1d3f90896ded6cda2f0b
-
Filesize
329KB
MD5347ddeb270b00a512ca28f1a4c1143ac
SHA1c5196ced883d22ed611345ec42dd8725a2f11214
SHA2563fd0cf76bc4a1a35e9afda02363e9b2e7702ea0b15461750e9dd04e4624c8bce
SHA512e05c5fddc2bedf50cd0db457f51b5179672c24cbdba7b2b321b9e64b762bd85d8c6c007b27d2e1086a7cca97a25639868943466aa7efc7884296fc7ced2b8375
-
Filesize
238KB
MD56cf5cc452e91d1fddfdfa2ec12aa7914
SHA1b67fd528739a41478a856346d7d8092005776fdc
SHA256dd1859a898ccde55a64302da2ae080bc9f9d7509d2b369b8ee3521ca50d92eb4
SHA5127210003eb44abfb3812b410a3124687a87d83a08c7d89c8ed5269ac90088bfb860256a19ea9f07c1a05883db19bdb0be2d7bbc072ea1424b19c007717f662fe1
-
Filesize
398KB
MD552053140c695f082d7e5e39a9b3ac14e
SHA12d500698b17c2dd2b8d37be2bc0d43b0877ac5a2
SHA2562d3617473ddb2e1a3f12aa4f599c624b70d90fa11d898e1468d3312ee6688222
SHA51237e295a259fbde69c85a7363b65035d36274a1e0593cd4517fe0a0c7870e3add20d9147de82797dafa0335b29295e02cb17bee5d2276d60cfad2d1fa5452ae61