Analysis

  • max time kernel
    103s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2025, 08:20

General

  • Target

    5ac2fcc4daab08132ad947ffedcf88286f2af526a260111f3ae00de9ba0a6283.exe

  • Size

    83KB

  • MD5

    299057a5ffbb5e70f8514df5f9796b9e

  • SHA1

    c9eb1364dd1220c074af581343b636995eea4288

  • SHA256

    5ac2fcc4daab08132ad947ffedcf88286f2af526a260111f3ae00de9ba0a6283

  • SHA512

    7b898cce4b6b252fa8b7bb5be36fcf98c191e59de655fcb2733f5263adc53ad06c0fb094d7df29d6cb872825c2e0d92ca1b2509519ce9ab317804bf949ece4c2

  • SSDEEP

    1536:yAMfrTX01OrGpRZNdbv66Claewnph6Nu3qdMhXWxZiXQv6Qd+FUf9bfNhExjDkOc:ZDewnphbwxfrff9bHEhDkOed

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Stormkitty family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ac2fcc4daab08132ad947ffedcf88286f2af526a260111f3ae00de9ba0a6283.exe
    "C:\Users\Admin\AppData\Local\Temp\5ac2fcc4daab08132ad947ffedcf88286f2af526a260111f3ae00de9ba0a6283.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2476
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\NVIDIA Local Drivers\DriversUpdateProcess_x64.exe
    1⤵
      PID:1416

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2476-0-0x00007FFCCA203000-0x00007FFCCA205000-memory.dmp

      Filesize

      8KB

    • memory/2476-1-0x00000000001D0000-0x00000000001EA000-memory.dmp

      Filesize

      104KB

    • memory/2476-2-0x00007FFCCA200000-0x00007FFCCACC1000-memory.dmp

      Filesize

      10.8MB

    • memory/2476-5-0x00007FFCCA200000-0x00007FFCCACC1000-memory.dmp

      Filesize

      10.8MB