Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-02-2025 14:01
Behavioral task
behavioral1
Sample
38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe
Resource
win10v2004-20250217-en
General
-
Target
38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe
-
Size
3.0MB
-
MD5
02d68259ec66bccf54a0e65d2f58adc6
-
SHA1
e97a2f6f59673ba873f3fdf70e47812d0f4d8c91
-
SHA256
38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2
-
SHA512
7b39cfcc91795a7d900f9e7cba6f966420e27f24c1a320ef76caea93b6513ff6a9330f9596d7bcdc9d81a23a6564908f4d523d469b10fa21d8d082cc5e64845f
-
SSDEEP
49152:lGOcVbo6v2NHGLSa9gUBX3B3kNC3H6vUZ0r/NFQ:lGOcm6UGLSm
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral1/memory/2512-1-0x00000000000B0000-0x00000000003B4000-memory.dmp family_stormkitty -
Stormkitty family
-
resource yara_rule behavioral1/memory/2512-1-0x00000000000B0000-0x00000000003B4000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeIncreaseQuotaPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSecurityPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeTakeOwnershipPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeLoadDriverPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemProfilePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemtimePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeProfSingleProcessPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeIncBasePriorityPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeCreatePagefilePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeBackupPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeRestorePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeShutdownPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeDebugPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemEnvironmentPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeRemoteShutdownPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeUndockPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeManageVolumePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 33 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 34 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 35 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeIncreaseQuotaPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSecurityPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeTakeOwnershipPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeLoadDriverPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemProfilePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemtimePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeProfSingleProcessPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeIncBasePriorityPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeCreatePagefilePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeBackupPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeRestorePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeShutdownPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeDebugPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeSystemEnvironmentPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeRemoteShutdownPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeUndockPrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: SeManageVolumePrivilege 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 33 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 34 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe Token: 35 2512 38e87226f9be912abc4984478d4d5ef4f008a936cf03d313e7d4588bc8c6d1d2.exe