Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-02-2025 13:58
Behavioral task
behavioral1
Sample
38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe
Resource
win10v2004-20250217-en
General
-
Target
38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe
-
Size
3.0MB
-
MD5
02d68259ec66bccf54a0e65d2f58adc6
-
SHA1
e97a2f6f59673ba873f3fdf70e47812d0f4d8c91
-
SHA256
38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2
-
SHA512
7b39cfcc91795a7d900f9e7cba6f966420e27f24c1a320ef76caea93b6513ff6a9330f9596d7bcdc9d81a23a6564908f4d523d469b10fa21d8d082cc5e64845f
-
SSDEEP
49152:lGOcVbo6v2NHGLSa9gUBX3B3kNC3H6vUZ0r/NFQ:lGOcm6UGLSm
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2380-1-0x0000000000C40000-0x0000000000F44000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeIncreaseQuotaPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSecurityPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeTakeOwnershipPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeLoadDriverPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemProfilePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemtimePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeProfSingleProcessPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeIncBasePriorityPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeCreatePagefilePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeBackupPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeRestorePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeShutdownPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeDebugPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemEnvironmentPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeRemoteShutdownPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeUndockPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeManageVolumePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 33 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 34 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 35 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeIncreaseQuotaPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSecurityPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeTakeOwnershipPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeLoadDriverPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemProfilePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemtimePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeProfSingleProcessPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeIncBasePriorityPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeCreatePagefilePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeBackupPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeRestorePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeShutdownPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeDebugPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemEnvironmentPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeRemoteShutdownPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeUndockPrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeManageVolumePrivilege 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 33 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 34 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 35 2380 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe