Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-02-2025 20:22
Static task
static1
Behavioral task
behavioral1
Sample
L5shRfh.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
L5shRfh.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral3
Sample
L5shRfh.exe
Resource
win11-20250210-en
General
-
Target
L5shRfh.exe
-
Size
6.2MB
-
MD5
3cb427c5f783752ea688c135b516dbb4
-
SHA1
8a9e0937d7db2b951f50c7cc1f0ebf42aaafb21b
-
SHA256
230b143294c018f8fc6c36581be214e2d3725546bba0a241da12854052806005
-
SHA512
f35074310eb13beb43039b440af695500e0eb4ff9634a820be9838e6bddeda8ca7d05ef969fe21f2ffd856bb88022d6e6c0b3b59cb131b90dcae22fe238f9697
-
SSDEEP
98304:H7SmQ0OBrD+f8wNVrq2+ow64WfRnZUo7SmQ0OBrD+f8wNVrq2+ow64WfRnZUW:HOmSDktNjZUoOmSDktNjZUW
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 5 IoCs
resource yara_rule behavioral1/memory/2460-13-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty behavioral1/memory/2460-6-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty behavioral1/memory/2460-5-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty behavioral1/memory/2460-11-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty behavioral1/memory/2460-10-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1440-1-0x0000000000B60000-0x00000000011A0000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1440 set thread context of 2460 1440 L5shRfh.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2952 1440 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2460 L5shRfh.exe Token: SeIncreaseQuotaPrivilege 2460 L5shRfh.exe Token: SeSecurityPrivilege 2460 L5shRfh.exe Token: SeTakeOwnershipPrivilege 2460 L5shRfh.exe Token: SeLoadDriverPrivilege 2460 L5shRfh.exe Token: SeSystemProfilePrivilege 2460 L5shRfh.exe Token: SeSystemtimePrivilege 2460 L5shRfh.exe Token: SeProfSingleProcessPrivilege 2460 L5shRfh.exe Token: SeIncBasePriorityPrivilege 2460 L5shRfh.exe Token: SeCreatePagefilePrivilege 2460 L5shRfh.exe Token: SeBackupPrivilege 2460 L5shRfh.exe Token: SeRestorePrivilege 2460 L5shRfh.exe Token: SeShutdownPrivilege 2460 L5shRfh.exe Token: SeDebugPrivilege 2460 L5shRfh.exe Token: SeSystemEnvironmentPrivilege 2460 L5shRfh.exe Token: SeRemoteShutdownPrivilege 2460 L5shRfh.exe Token: SeUndockPrivilege 2460 L5shRfh.exe Token: SeManageVolumePrivilege 2460 L5shRfh.exe Token: 33 2460 L5shRfh.exe Token: 34 2460 L5shRfh.exe Token: 35 2460 L5shRfh.exe Token: SeIncreaseQuotaPrivilege 2460 L5shRfh.exe Token: SeSecurityPrivilege 2460 L5shRfh.exe Token: SeTakeOwnershipPrivilege 2460 L5shRfh.exe Token: SeLoadDriverPrivilege 2460 L5shRfh.exe Token: SeSystemProfilePrivilege 2460 L5shRfh.exe Token: SeSystemtimePrivilege 2460 L5shRfh.exe Token: SeProfSingleProcessPrivilege 2460 L5shRfh.exe Token: SeIncBasePriorityPrivilege 2460 L5shRfh.exe Token: SeCreatePagefilePrivilege 2460 L5shRfh.exe Token: SeBackupPrivilege 2460 L5shRfh.exe Token: SeRestorePrivilege 2460 L5shRfh.exe Token: SeShutdownPrivilege 2460 L5shRfh.exe Token: SeDebugPrivilege 2460 L5shRfh.exe Token: SeSystemEnvironmentPrivilege 2460 L5shRfh.exe Token: SeRemoteShutdownPrivilege 2460 L5shRfh.exe Token: SeUndockPrivilege 2460 L5shRfh.exe Token: SeManageVolumePrivilege 2460 L5shRfh.exe Token: 33 2460 L5shRfh.exe Token: 34 2460 L5shRfh.exe Token: 35 2460 L5shRfh.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2464 1440 L5shRfh.exe 31 PID 1440 wrote to memory of 2464 1440 L5shRfh.exe 31 PID 1440 wrote to memory of 2464 1440 L5shRfh.exe 31 PID 1440 wrote to memory of 2464 1440 L5shRfh.exe 31 PID 1440 wrote to memory of 2460 1440 L5shRfh.exe 32 PID 1440 wrote to memory of 2460 1440 L5shRfh.exe 32 PID 1440 wrote to memory of 2460 1440 L5shRfh.exe 32 PID 1440 wrote to memory of 2460 1440 L5shRfh.exe 32 PID 1440 wrote to memory of 2460 1440 L5shRfh.exe 32 PID 1440 wrote to memory of 2460 1440 L5shRfh.exe 32 PID 1440 wrote to memory of 2460 1440 L5shRfh.exe 32 PID 1440 wrote to memory of 2460 1440 L5shRfh.exe 32 PID 1440 wrote to memory of 2460 1440 L5shRfh.exe 32 PID 1440 wrote to memory of 2952 1440 L5shRfh.exe 33 PID 1440 wrote to memory of 2952 1440 L5shRfh.exe 33 PID 1440 wrote to memory of 2952 1440 L5shRfh.exe 33 PID 1440 wrote to memory of 2952 1440 L5shRfh.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"2⤵PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 5482⤵
- Program crash
PID:2952
-