Analysis

  • max time kernel
    66s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2023 14:47

General

  • Target

    https://github.com/Bulldogfrfr/LaF-krunker-Client/blob/main/LaF_Setup_Windows_x64.exe

Score
10/10

Malware Config

Signatures

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Program crash 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/Bulldogfrfr/LaF-krunker-Client/blob/main/LaF_Setup_Windows_x64.exe
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:852 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1380
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TAR9OKL9\LaF_Setup_Windows_x64.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TAR9OKL9\LaF_Setup_Windows_x64.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1276 -s 656
        3⤵
        • Program crash
        PID:1168

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c82951d4415e69aa5af0a60f05747879

    SHA1

    7a489e340913124e47260d5f7edd99d3733317ad

    SHA256

    bb2602d843be043d692854001787d2cece2064164a9b94994769958d7857d93d

    SHA512

    c960bcf5cc27f45d5f5a03422a44859f76bbdc1efb4e3999b98bf7c897d1971dd02f4f66eb706508abd7c6f9b2c8f78d94248da63fdb40fb68d0165f07570dc3

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\309axvf\imagestore.dat
    Filesize

    5KB

    MD5

    1b34de76a16cbf24ef3f23a0d5eefd70

    SHA1

    a4180ada4999ccf748fa6667e5f894837ceb5b3d

    SHA256

    e2a1ed07711f94443216ef73ec715994abca1d80a965778f9548ddca059173c8

    SHA512

    399923ab42b5f67715a9f08cc7b0d695221bf1afe4e95860d0cc220c7b4405327c2b722c8f0524eb47d681afd20d56da97a87474cff70d012c1472fee0f07871

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TAR9OKL9\LaF_Setup_Windows_x64.exe
    Filesize

    63KB

    MD5

    25fc98107ffc3d6763b702f1167e913f

    SHA1

    aeaa8b4139771dbec081f34cd1e382e8317a9fbd

    SHA256

    19cd3bbcb2e7013aa7ac5240a481c059824d32ee039652a5cab79da08b84d4e6

    SHA512

    37a3accb6457fa7d9b8e647dab779ded49798e96efea2e11847ef354419ff39d4eb217dc3c88686bec8839b9f5be5dca2718647c93b0fdccd400928cc9457f35

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TAR9OKL9\LaF_Setup_Windows_x64.exe.nmscjmv.partial
    Filesize

    63KB

    MD5

    25fc98107ffc3d6763b702f1167e913f

    SHA1

    aeaa8b4139771dbec081f34cd1e382e8317a9fbd

    SHA256

    19cd3bbcb2e7013aa7ac5240a481c059824d32ee039652a5cab79da08b84d4e6

    SHA512

    37a3accb6457fa7d9b8e647dab779ded49798e96efea2e11847ef354419ff39d4eb217dc3c88686bec8839b9f5be5dca2718647c93b0fdccd400928cc9457f35

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\L55GRX13.txt
    Filesize

    598B

    MD5

    0bae92fb5d9c8a085117f6e1ea884993

    SHA1

    77106deb6adcd951da1ceb7118623e810be014f4

    SHA256

    f14bd280d9cfddc7cf77ea5100e22375acc7984cf73ce21d295c214931a329af

    SHA512

    4dd358aa6bc96cd214c72ee18e7e549d268b8b3d4adb48ad23d208965999b302081bd2822a27cd25981cdfb1fd809ea1bfe8f0fb94daaee99baab5edd05ebf08

  • memory/1168-59-0x0000000000000000-mapping.dmp
  • memory/1276-56-0x0000000000000000-mapping.dmp
  • memory/1276-58-0x0000000000C00000-0x0000000000C16000-memory.dmp
    Filesize

    88KB