Analysis
-
max time kernel
131s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
2025 Proposal - AI Series Docs.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
oledlg.dll
Resource
win10v2004-20250314-en
General
-
Target
2025 Proposal - AI Series Docs.exe
-
Size
6.1MB
-
MD5
f132c32b7b68fdefc276ae768e4c40f8
-
SHA1
a61f091e0b3ff7b246f4b81c871f10da0eb21c00
-
SHA256
f2178c9ed9d6f6140b1735767332e04f47ca317bd246022a297145478678bc4b
-
SHA512
0d5598660eddf8badb52b12f95b9d2fdd520ce5e9eb376123f1694282c8142b8931cc1f6f73e442f287afb662d666fb64c95cdd6e5febf9c464008eafd314676
-
SSDEEP
98304:HZQIM+/nv/CDoAkYwpAa5ge1zZ/jtdZwUkQ:9JCKlA2VKUz
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/memory/3484-1-0x0000000001040000-0x000000000137A000-memory.dmp family_stormkitty behavioral1/memory/3912-16-0x00000000010C0000-0x00000000013FA000-memory.dmp family_stormkitty -
Stormkitty family
-
resource yara_rule behavioral1/memory/3484-1-0x0000000001040000-0x000000000137A000-memory.dmp VenomRAT behavioral1/memory/3912-16-0x00000000010C0000-0x00000000013FA000-memory.dmp VenomRAT -
Venomrat family
-
Loads dropped DLL 1 IoCs
pid Process 4840 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortex XDR Versus = "rundll32.exe C:\\Users\\Admin\\Documents\\Volternon0549303.dll,EntryPoint" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3528 set thread context of 3484 3528 2025 Proposal - AI Series Docs.exe 102 PID 4840 set thread context of 3912 4840 rundll32.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025 Proposal - AI Series Docs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe 3528 2025 Proposal - AI Series Docs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3484 csc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3484 csc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3528 wrote to memory of 3484 3528 2025 Proposal - AI Series Docs.exe 102 PID 3528 wrote to memory of 3484 3528 2025 Proposal - AI Series Docs.exe 102 PID 3528 wrote to memory of 3484 3528 2025 Proposal - AI Series Docs.exe 102 PID 3528 wrote to memory of 3484 3528 2025 Proposal - AI Series Docs.exe 102 PID 3528 wrote to memory of 3484 3528 2025 Proposal - AI Series Docs.exe 102 PID 3528 wrote to memory of 3484 3528 2025 Proposal - AI Series Docs.exe 102 PID 3528 wrote to memory of 4092 3528 2025 Proposal - AI Series Docs.exe 103 PID 3528 wrote to memory of 4092 3528 2025 Proposal - AI Series Docs.exe 103 PID 3528 wrote to memory of 4092 3528 2025 Proposal - AI Series Docs.exe 103 PID 4092 wrote to memory of 6000 4092 cmd.exe 105 PID 4092 wrote to memory of 6000 4092 cmd.exe 105 PID 4092 wrote to memory of 6000 4092 cmd.exe 105 PID 5912 wrote to memory of 1008 5912 cmd.exe 108 PID 5912 wrote to memory of 1008 5912 cmd.exe 108 PID 1008 wrote to memory of 4840 1008 rundll32.exe 109 PID 1008 wrote to memory of 4840 1008 rundll32.exe 109 PID 1008 wrote to memory of 4840 1008 rundll32.exe 109 PID 4840 wrote to memory of 3912 4840 rundll32.exe 111 PID 4840 wrote to memory of 3912 4840 rundll32.exe 111 PID 4840 wrote to memory of 3912 4840 rundll32.exe 111 PID 4840 wrote to memory of 3912 4840 rundll32.exe 111 PID 4840 wrote to memory of 3912 4840 rundll32.exe 111 PID 4840 wrote to memory of 3912 4840 rundll32.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025 Proposal - AI Series Docs.exe"C:\Users\Admin\AppData\Local\Temp\2025 Proposal - AI Series Docs.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Cortex XDR Versus" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\Volternon0549303.dll",EntryPoint /f & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Cortex XDR Versus" /t REG_SZ /d "rundll32.exe C:\Users\Admin\Documents\Volternon0549303.dll",EntryPoint /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:6000
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c rundll32.exe C:\Users\Admin\Documents\Volternon0549303.dll,EntryPoint1⤵
- Suspicious use of WriteProcessMemory
PID:5912 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\Documents\Volternon0549303.dll,EntryPoint2⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\Documents\Volternon0549303.dll,EntryPoint3⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3912
-
-
-