Analysis
-
max time kernel
144s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-02-2025 12:06
Static task
static1
Behavioral task
behavioral1
Sample
COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe
Resource
win10v2004-20250217-en
General
-
Target
COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe
-
Size
1.0MB
-
MD5
ac1f0b54a2d984cf1d252e7366882483
-
SHA1
e542633ec13beae03de606f95e8b347846047dae
-
SHA256
7011d49d4411fac299bfdb5063198f2f2c74cc867b4ef57a826beb114c46eb32
-
SHA512
3142a99f7492ae80e15f66215ebe1ce2cecd578187d0ace4fd47f2e964c531bb625be551a9f6c1cae90ee931a82ac8653473eb612fdab4f86988b78eec49a9ee
-
SSDEEP
24576:Pu6J33O0c+JY5UZ+XC0kGso6FaGD7UjAHeWY:5u0c++OCvkGs9FaGDAj4Y
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7774608033:AAE1fvMZ0hM_UWWpPC6wvLbB9fKWjR8j4wA/sendMessage?chat_id=5224323271
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 3 IoCs
resource yara_rule behavioral1/memory/1832-32-0x0000000000400000-0x0000000000432000-memory.dmp family_stormkitty behavioral1/memory/1832-36-0x0000000000400000-0x0000000000432000-memory.dmp family_stormkitty behavioral1/memory/1832-34-0x0000000000400000-0x0000000000432000-memory.dmp family_stormkitty -
Stormkitty family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\troopwise.vbs troopwise.exe -
Executes dropped EXE 1 IoCs
pid Process 2404 troopwise.exe -
Loads dropped DLL 1 IoCs
pid Process 3020 COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe -
Drops desktop.ini file(s) 7 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RegSvcs.exe File opened for modification C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RegSvcs.exe File created C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Documents\desktop.ini RegSvcs.exe File created C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Pictures\desktop.ini RegSvcs.exe File created C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RegSvcs.exe File opened for modification C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Desktop\desktop.ini RegSvcs.exe File created C:\Users\Admin\AppData\Local\d0aa91f51b91ba5510f436cc99b274cd\Admin@UPNECVIU_en-US\Grabber\DRIVE-C\Users\Admin\Downloads\desktop.ini RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000016dd0-13.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2404 set thread context of 1832 2404 troopwise.exe 31 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language troopwise.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2768 cmd.exe 2480 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 RegSvcs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1832 RegSvcs.exe 1832 RegSvcs.exe 1832 RegSvcs.exe 1832 RegSvcs.exe 1832 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2404 troopwise.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1832 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3020 COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe 3020 COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe 2404 troopwise.exe 2404 troopwise.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3020 COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe 3020 COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe 2404 troopwise.exe 2404 troopwise.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2404 3020 COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe 30 PID 3020 wrote to memory of 2404 3020 COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe 30 PID 3020 wrote to memory of 2404 3020 COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe 30 PID 3020 wrote to memory of 2404 3020 COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe 30 PID 2404 wrote to memory of 1832 2404 troopwise.exe 31 PID 2404 wrote to memory of 1832 2404 troopwise.exe 31 PID 2404 wrote to memory of 1832 2404 troopwise.exe 31 PID 2404 wrote to memory of 1832 2404 troopwise.exe 31 PID 2404 wrote to memory of 1832 2404 troopwise.exe 31 PID 2404 wrote to memory of 1832 2404 troopwise.exe 31 PID 2404 wrote to memory of 1832 2404 troopwise.exe 31 PID 2404 wrote to memory of 1832 2404 troopwise.exe 31 PID 1832 wrote to memory of 2768 1832 RegSvcs.exe 34 PID 1832 wrote to memory of 2768 1832 RegSvcs.exe 34 PID 1832 wrote to memory of 2768 1832 RegSvcs.exe 34 PID 1832 wrote to memory of 2768 1832 RegSvcs.exe 34 PID 2768 wrote to memory of 2892 2768 cmd.exe 36 PID 2768 wrote to memory of 2892 2768 cmd.exe 36 PID 2768 wrote to memory of 2892 2768 cmd.exe 36 PID 2768 wrote to memory of 2892 2768 cmd.exe 36 PID 2768 wrote to memory of 2480 2768 cmd.exe 37 PID 2768 wrote to memory of 2480 2768 cmd.exe 37 PID 2768 wrote to memory of 2480 2768 cmd.exe 37 PID 2768 wrote to memory of 2480 2768 cmd.exe 37 PID 2768 wrote to memory of 2440 2768 cmd.exe 38 PID 2768 wrote to memory of 2440 2768 cmd.exe 38 PID 2768 wrote to memory of 2440 2768 cmd.exe 38 PID 2768 wrote to memory of 2440 2768 cmd.exe 38 PID 1832 wrote to memory of 2284 1832 RegSvcs.exe 39 PID 1832 wrote to memory of 2284 1832 RegSvcs.exe 39 PID 1832 wrote to memory of 2284 1832 RegSvcs.exe 39 PID 1832 wrote to memory of 2284 1832 RegSvcs.exe 39 PID 2284 wrote to memory of 2372 2284 cmd.exe 41 PID 2284 wrote to memory of 2372 2284 cmd.exe 41 PID 2284 wrote to memory of 2372 2284 cmd.exe 41 PID 2284 wrote to memory of 2372 2284 cmd.exe 41 PID 2284 wrote to memory of 1624 2284 cmd.exe 42 PID 2284 wrote to memory of 1624 2284 cmd.exe 42 PID 2284 wrote to memory of 1624 2284 cmd.exe 42 PID 2284 wrote to memory of 1624 2284 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe"C:\Users\Admin\AppData\Local\Temp\COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Thebesian\troopwise.exe"C:\Users\Admin\AppData\Local\Temp\COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\COMMERCAILINVOICEANDDHLAWBTRACKINGDETAILS.exe"3⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
- System Location Discovery: System Language Discovery
PID:2892
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2480
-
-
C:\Windows\SysWOW64\findstr.exefindstr All5⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid5⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
28KB
MD5ec9f1df5cec11c21b23b88d830b6637c
SHA185aba3d5bd078cc650114e0c47765ce3f36eb52e
SHA25636de505436f296685031d9be83d11bfa08d28c6a289341ddcd5b1cefa534ec80
SHA51255747094e292bb0922f1025817cfa9a40b48a9f87027ac48780942726fae08558b0aa7f411f912d70e3055c2c74534654f678091bff88c8135bb82a1c0c0f1b8
-
Filesize
1.0MB
MD5ac1f0b54a2d984cf1d252e7366882483
SHA1e542633ec13beae03de606f95e8b347846047dae
SHA2567011d49d4411fac299bfdb5063198f2f2c74cc867b4ef57a826beb114c46eb32
SHA5123142a99f7492ae80e15f66215ebe1ce2cecd578187d0ace4fd47f2e964c531bb625be551a9f6c1cae90ee931a82ac8653473eb612fdab4f86988b78eec49a9ee