Analysis
-
max time kernel
2s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 19:19
Behavioral task
behavioral1
Sample
CryptoFactory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CryptoFactory.exe
Resource
win10v2004-20241007-en
General
-
Target
CryptoFactory.exe
-
Size
6.0MB
-
MD5
527e4ae4c9a4f056e8a4ca219c5089e6
-
SHA1
dfc855147f098b2db6857c0e3305b8850c61671f
-
SHA256
06a8dff1d1fba038b6d551d502eca4ff79a471a7f3c46ea4cfc88bce5ba86b62
-
SHA512
7d17209527e6cb292e8f74197a2c44de8b72307432b3477dee88edb48b2bf2c4c7647edef3dcd68f2e935601c9046f0225a254a2d572af34ef712f3387d5e7c1
-
SSDEEP
98304:aGOYln80EisK9yJND14r0Uhmkl1qa1Egu2Wh/X9Tm0OXcPwQESF/IKc6jF:aFqnPEZZzeJmkl1qHd2i/9TjElH8QKcK
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016d89-16.dat family_stormkitty behavioral1/memory/2676-19-0x0000000000340000-0x00000000003B2000-memory.dmp family_stormkitty -
Stormkitty family
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/files/0x0008000000016d89-16.dat net_reactor behavioral1/memory/2676-19-0x0000000000340000-0x00000000003B2000-memory.dmp net_reactor -
Executes dropped EXE 2 IoCs
pid Process 2816 CryptoFactory.exe 2676 Client.exe -
Loads dropped DLL 7 IoCs
pid Process 2124 CryptoFactory.exe 2124 CryptoFactory.exe 888 WerFault.exe 888 WerFault.exe 888 WerFault.exe 888 WerFault.exe 888 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 888 2676 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoFactory.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoFactory.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2816 2124 CryptoFactory.exe 30 PID 2124 wrote to memory of 2816 2124 CryptoFactory.exe 30 PID 2124 wrote to memory of 2816 2124 CryptoFactory.exe 30 PID 2124 wrote to memory of 2816 2124 CryptoFactory.exe 30 PID 2124 wrote to memory of 2676 2124 CryptoFactory.exe 31 PID 2124 wrote to memory of 2676 2124 CryptoFactory.exe 31 PID 2124 wrote to memory of 2676 2124 CryptoFactory.exe 31 PID 2124 wrote to memory of 2676 2124 CryptoFactory.exe 31 PID 2676 wrote to memory of 888 2676 Client.exe 32 PID 2676 wrote to memory of 888 2676 Client.exe 32 PID 2676 wrote to memory of 888 2676 Client.exe 32 PID 2676 wrote to memory of 888 2676 Client.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\CryptoFactory.exe"C:\Users\Admin\AppData\Local\Temp\CryptoFactory.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\CryptoFactory.exe"C:\Users\Admin\AppData\Roaming\CryptoFactory.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Users\Admin\AppData\Roaming\Client.exe"C:\Users\Admin\AppData\Roaming\Client.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 5203⤵
- Loads dropped DLL
- Program crash
PID:888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD5a66341eb6be2e1497bc12048697b0a1b
SHA1a721702b08f10d97c9cc1d041b1f147cc269a996
SHA256c9ee99ccabd3260875974019160063dbbf4bf7bb9d4a9cc9a44ccbaf23ac050a
SHA512154e60bfc9f29d1d18aa5fbdc36e10c045cd16402191036dc80c7f8a0f6ca4219361668c5a5f5f01d799b2fe1be319432d358593c230e49bf1d608a3bac5508d
-
Filesize
4.6MB
MD5015af0b0f020d555b6aa8954b7e19117
SHA1c11323f09e800b83f346b4ccfbedbd7919c54b5e
SHA2569ddabf3b607d6af97bd37b5d5a21bfdfc297e77f869cd75ba189dc79fcc64f33
SHA51212a8cdc2b122392a440f5d1b53bb8765158958416c8e217573d14f6aa8bf1d587ceb722e09d85a86ebf042ce89dafdd77b1ccf8354c73528285dfc641e90ea9d
-
Filesize
4.6MB
MD5f5235488b702f4b1575bf4a3c0ef6147
SHA12bda5e066040d5a8237051b6c002264c8ac4ad28
SHA2565cbf590c6d01aa67ce2ac5a9ed5e436dff5e1e75ff6a05218faced3ecb0c3852
SHA5126a24fbdae06cf4de23d9dd3bc064c201a56e9e89a9ef94a8870238210a70385da154d7613f3ed8b997d0eef2ad1c0f2b4357aadde1affe8e0ed2304f9b281477
-
Filesize
5.5MB
MD5b8868b8ca49dc243910c548e69ca40f5
SHA17d97525e2210ba3ff8a5ea300e4cd95c5827aa39
SHA256066fa46e73427f2f9e2d7d6128b2a283a1300114d25240a531bbea3f27039d6c
SHA512809f8d5eb0a1d67416566ad358406a44d839e8336a22c6e489a4d03d250178331091c5c17231d1065df267060d1c3fc1226a1a38cf586944c3d0225cce17c186