Analysis
-
max time kernel
104s -
max time network
151s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
31/03/2025, 13:39
Behavioral task
behavioral1
Sample
Build.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
Build.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
Build.exe
Resource
win11-20250313-en
General
-
Target
Build.exe
-
Size
245KB
-
MD5
8ada41ef81ed91792ec1bc128daa0d2f
-
SHA1
12064be78a56ee540b1fa8d2257dcf487de4e82d
-
SHA256
a7d45abc7981ac8e1d5e2f7e64ac063c083d9112dd8cd79440d892360b3a3224
-
SHA512
a4e086f307dce33cfc3abc13989b8da8d2558ecf85a0f5e04338fb441560a56e94281c3afbb1a06f2dc18ee4e5149b1a28a0e11c05a7d7b6a1117a436000dc5d
-
SSDEEP
6144:Ze5/oFzXx7YxnXywmipeHlUusJQLoqb+tpbz:U5wFzB7YxnXy+peOvL
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/6092-1-0x0000000000240000-0x0000000000284000-memory.dmp family_stormkitty -
Stormkitty family
-
Uses browser remote debugging 2 TTPs 5 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 852 chrome.exe 2100 chrome.exe 5340 chrome.exe 752 chrome.exe 4048 chrome.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe Key opened \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe Key opened \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 ipinfo.io 6 ipinfo.io -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Build.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2492 cmd.exe 5648 netsh.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Build.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 6092 Build.exe 5340 chrome.exe 5340 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe 5340 chrome.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 6092 Build.exe Token: SeShutdownPrivilege 5340 chrome.exe Token: SeCreatePagefilePrivilege 5340 chrome.exe Token: SeShutdownPrivilege 5340 chrome.exe Token: SeCreatePagefilePrivilege 5340 chrome.exe Token: SeShutdownPrivilege 5340 chrome.exe Token: SeCreatePagefilePrivilege 5340 chrome.exe Token: SeShutdownPrivilege 5340 chrome.exe Token: SeCreatePagefilePrivilege 5340 chrome.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5340 chrome.exe 5340 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6092 wrote to memory of 2492 6092 Build.exe 84 PID 6092 wrote to memory of 2492 6092 Build.exe 84 PID 6092 wrote to memory of 2492 6092 Build.exe 84 PID 2492 wrote to memory of 2824 2492 cmd.exe 87 PID 2492 wrote to memory of 2824 2492 cmd.exe 87 PID 2492 wrote to memory of 2824 2492 cmd.exe 87 PID 2492 wrote to memory of 5648 2492 cmd.exe 88 PID 2492 wrote to memory of 5648 2492 cmd.exe 88 PID 2492 wrote to memory of 5648 2492 cmd.exe 88 PID 2492 wrote to memory of 2660 2492 cmd.exe 89 PID 2492 wrote to memory of 2660 2492 cmd.exe 89 PID 2492 wrote to memory of 2660 2492 cmd.exe 89 PID 6092 wrote to memory of 4892 6092 Build.exe 91 PID 6092 wrote to memory of 4892 6092 Build.exe 91 PID 6092 wrote to memory of 4892 6092 Build.exe 91 PID 4892 wrote to memory of 4948 4892 cmd.exe 93 PID 4892 wrote to memory of 4948 4892 cmd.exe 93 PID 4892 wrote to memory of 4948 4892 cmd.exe 93 PID 4892 wrote to memory of 4788 4892 cmd.exe 94 PID 4892 wrote to memory of 4788 4892 cmd.exe 94 PID 4892 wrote to memory of 4788 4892 cmd.exe 94 PID 6092 wrote to memory of 5340 6092 Build.exe 97 PID 6092 wrote to memory of 5340 6092 Build.exe 97 PID 5340 wrote to memory of 2348 5340 chrome.exe 98 PID 5340 wrote to memory of 2348 5340 chrome.exe 98 PID 5340 wrote to memory of 2924 5340 chrome.exe 99 PID 5340 wrote to memory of 2924 5340 chrome.exe 99 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 1420 5340 chrome.exe 100 PID 5340 wrote to memory of 3772 5340 chrome.exe 101 PID 5340 wrote to memory of 3772 5340 chrome.exe 101 PID 5340 wrote to memory of 3772 5340 chrome.exe 101 PID 5340 wrote to memory of 3772 5340 chrome.exe 101 PID 5340 wrote to memory of 3772 5340 chrome.exe 101 PID 5340 wrote to memory of 3772 5340 chrome.exe 101 PID 5340 wrote to memory of 3772 5340 chrome.exe 101 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-73851796-4078923053-1419757224-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Build.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Build.exe"C:\Users\Admin\AppData\Local\Temp\Build.exe"1⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:6092 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:5648
-
-
C:\Windows\SysWOW64\findstr.exefindstr All3⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
- System Location Discovery: System Language Discovery
PID:4948
-
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4788
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5340 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff88710dcf8,0x7ff88710dd04,0x7ff88710dd103⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1620,i,1857318878268590171,4278550854488335882,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2120 /prefetch:33⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2056,i,1857318878268590171,4278550854488335882,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2052 /prefetch:23⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2452,i,1857318878268590171,4278550854488335882,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2640 /prefetch:83⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3216,i,1857318878268590171,4278550854488335882,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3292 /prefetch:13⤵
- Uses browser remote debugging
PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,1857318878268590171,4278550854488335882,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3312 /prefetch:13⤵
- Uses browser remote debugging
PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4316,i,1857318878268590171,4278550854488335882,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4340 /prefetch:23⤵
- Uses browser remote debugging
PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4752,i,1857318878268590171,4278550854488335882,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4784 /prefetch:13⤵
- Uses browser remote debugging
PID:2100
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
80KB
MD5b9e7195a12fb30c858f3040646820ebb
SHA1e019373b54712658f3f3ce6a7b8412138ab00d4b
SHA256b20b1aaeca468b3b0ad32bfb08ebcec85e12576420c40e9ca28e02f3e0f00070
SHA51225121985666a6bff46d4698f039c054c168278099a5a661436d036f3cd836a603a27fd38b3edb118b1f5ef8589fccdd57bde5959c31c2ff6e1e699c09fc7c183
-
Filesize
81B
MD5ea511fc534efd031f852fcf490b76104
SHA1573e5fa397bc953df5422abbeb1a52bf94f7cf00
SHA256e5fe7f327ae62df007bd1117aa7f522dbbcd371ec67953f66d786424cb1d7995
SHA512f7d8e575a2332b0fbd491b5e092b7ed6b0942a5165557fcc5d215d873b05103aa6ba01843133871c1c7ac81b10182a15895be49885c98d1a379dd55f88004fae
-
Filesize
4KB
MD5b0732d33e21809465a8af8f7616575f3
SHA1e2fbd5603eb52afdb4fe0b1c24885d0696a4ae7b
SHA256e92bb3b0dd2cfecea2210834a3ce75bcfb589ff1ecb472e4894950c3f5339443
SHA512608b076361dce586890d6ed04dac64d1c7dd66c91217bb0c297470b96643c0209a50ae950dbbb2e8423803b6e67a1b612a3f083cf70cef647e607c3ea0444503