Analysis
-
max time kernel
0s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:19
Behavioral task
behavioral1
Sample
CryptoFactory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CryptoFactory.exe
Resource
win10v2004-20241007-en
General
-
Target
CryptoFactory.exe
-
Size
6.0MB
-
MD5
527e4ae4c9a4f056e8a4ca219c5089e6
-
SHA1
dfc855147f098b2db6857c0e3305b8850c61671f
-
SHA256
06a8dff1d1fba038b6d551d502eca4ff79a471a7f3c46ea4cfc88bce5ba86b62
-
SHA512
7d17209527e6cb292e8f74197a2c44de8b72307432b3477dee88edb48b2bf2c4c7647edef3dcd68f2e935601c9046f0225a254a2d572af34ef712f3387d5e7c1
-
SSDEEP
98304:aGOYln80EisK9yJND14r0Uhmkl1qa1Egu2Wh/X9Tm0OXcPwQESF/IKc6jF:aFqnPEZZzeJmkl1qHd2i/9TjElH8QKcK
Malware Config
Signatures
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 2 IoCs
resource yara_rule behavioral2/memory/2592-27-0x00000000002E0000-0x0000000000352000-memory.dmp family_stormkitty behavioral2/files/0x0007000000023cb5-24.dat family_stormkitty -
Stormkitty family
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral2/memory/2592-27-0x00000000002E0000-0x0000000000352000-memory.dmp net_reactor behavioral2/files/0x0007000000023cb5-24.dat net_reactor -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CryptoFactory.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 3764 2592 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoFactory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CryptoFactory.exe"C:\Users\Admin\AppData\Local\Temp\CryptoFactory.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Users\Admin\AppData\Roaming\CryptoFactory.exe"C:\Users\Admin\AppData\Roaming\CryptoFactory.exe"2⤵PID:4164
-
-
C:\Users\Admin\AppData\Roaming\Client.exe"C:\Users\Admin\AppData\Roaming\Client.exe"2⤵PID:2592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 7883⤵
- Program crash
PID:3764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2592 -ip 25921⤵PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD5a66341eb6be2e1497bc12048697b0a1b
SHA1a721702b08f10d97c9cc1d041b1f147cc269a996
SHA256c9ee99ccabd3260875974019160063dbbf4bf7bb9d4a9cc9a44ccbaf23ac050a
SHA512154e60bfc9f29d1d18aa5fbdc36e10c045cd16402191036dc80c7f8a0f6ca4219361668c5a5f5f01d799b2fe1be319432d358593c230e49bf1d608a3bac5508d
-
Filesize
4.8MB
MD5e0420dafe77952b8b4e0bf37032aefcb
SHA19ecc683ebac8295636271f8bd4d8faa68ab118d6
SHA25685120662f778f29f57dc144901d69418576835fa015541f91210b6ee98587c74
SHA51286a51997b18df98bfc45acd7987fc985d35d56a04e8ce8bd79e4ce8ae47b6764ce1fa342177604bbffc49c2fc2e763a1da2186a6e33db01c9d84c25a7e245dab
-
Filesize
4.1MB
MD5c50d1ed6d5f20b8deaa2de1d1b093979
SHA1db1765aad7d201e4538702468f448ca43bb13e15
SHA256216c3fcf3f7ce041bbe2fe838203a0f58d70f26f179348a30e7f16faa6d62229
SHA5123174d576d1ae4c6ee676eecf1a76e26648571ae5209607f80f0680472c5d3f8281126de4f6af2fde6a42ef576d622d4e881fc4018b2985b00e6ca309ad93e26c
-
Filesize
4.4MB
MD5a711fd416cd5f763a62cf5cea6a3facd
SHA17ec788d689eb653d1295bf3836c1a94a29be9da2
SHA25606b1504869220b6a907a6e4b79a7a0be0df599e25dc2b5e6d1327c9ec0354287
SHA512108304bc4e36d4b36d5f257458cc06a4d8b7765b863a9b4ad9ba4bc31fbbb637b4997511e407291f6e5ea40659b9bc766f1881e0a73a33cd88b89a8e11f16476