Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20250210-en -
resource tags
arch:x64arch:x86image:win11-20250210-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-02-2025 20:22
Static task
static1
Behavioral task
behavioral1
Sample
L5shRfh.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
L5shRfh.exe
Resource
win10ltsc2021-20250211-en
Behavioral task
behavioral3
Sample
L5shRfh.exe
Resource
win11-20250210-en
General
-
Target
L5shRfh.exe
-
Size
6.2MB
-
MD5
3cb427c5f783752ea688c135b516dbb4
-
SHA1
8a9e0937d7db2b951f50c7cc1f0ebf42aaafb21b
-
SHA256
230b143294c018f8fc6c36581be214e2d3725546bba0a241da12854052806005
-
SHA512
f35074310eb13beb43039b440af695500e0eb4ff9634a820be9838e6bddeda8ca7d05ef969fe21f2ffd856bb88022d6e6c0b3b59cb131b90dcae22fe238f9697
-
SSDEEP
98304:H7SmQ0OBrD+f8wNVrq2+ow64WfRnZUo7SmQ0OBrD+f8wNVrq2+ow64WfRnZUW:HOmSDktNjZUoOmSDktNjZUW
Malware Config
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral3/memory/4664-4-0x0000000000400000-0x0000000000704000-memory.dmp family_stormkitty -
Stormkitty family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 18 3804 Process not Found -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral3/memory/4392-1-0x0000000000CA0000-0x00000000012E0000-memory.dmp net_reactor -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4392 set thread context of 4664 4392 L5shRfh.exe 88 PID 4392 set thread context of 4628 4392 L5shRfh.exe 90 -
Program crash 2 IoCs
pid pid_target Process procid_target 3744 4392 WerFault.exe 84 4848 4664 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L5shRfh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3772 MicrosoftEdgeUpdate.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4664 L5shRfh.exe Token: SeIncreaseQuotaPrivilege 4664 L5shRfh.exe Token: SeSecurityPrivilege 4664 L5shRfh.exe Token: SeTakeOwnershipPrivilege 4664 L5shRfh.exe Token: SeLoadDriverPrivilege 4664 L5shRfh.exe Token: SeSystemProfilePrivilege 4664 L5shRfh.exe Token: SeSystemtimePrivilege 4664 L5shRfh.exe Token: SeProfSingleProcessPrivilege 4664 L5shRfh.exe Token: SeIncBasePriorityPrivilege 4664 L5shRfh.exe Token: SeCreatePagefilePrivilege 4664 L5shRfh.exe Token: SeBackupPrivilege 4664 L5shRfh.exe Token: SeRestorePrivilege 4664 L5shRfh.exe Token: SeShutdownPrivilege 4664 L5shRfh.exe Token: SeDebugPrivilege 4664 L5shRfh.exe Token: SeSystemEnvironmentPrivilege 4664 L5shRfh.exe Token: SeRemoteShutdownPrivilege 4664 L5shRfh.exe Token: SeUndockPrivilege 4664 L5shRfh.exe Token: SeManageVolumePrivilege 4664 L5shRfh.exe Token: 33 4664 L5shRfh.exe Token: 34 4664 L5shRfh.exe Token: 35 4664 L5shRfh.exe Token: 36 4664 L5shRfh.exe Token: SeIncreaseQuotaPrivilege 4664 L5shRfh.exe Token: SeSecurityPrivilege 4664 L5shRfh.exe Token: SeTakeOwnershipPrivilege 4664 L5shRfh.exe Token: SeLoadDriverPrivilege 4664 L5shRfh.exe Token: SeSystemProfilePrivilege 4664 L5shRfh.exe Token: SeSystemtimePrivilege 4664 L5shRfh.exe Token: SeProfSingleProcessPrivilege 4664 L5shRfh.exe Token: SeIncBasePriorityPrivilege 4664 L5shRfh.exe Token: SeCreatePagefilePrivilege 4664 L5shRfh.exe Token: SeBackupPrivilege 4664 L5shRfh.exe Token: SeRestorePrivilege 4664 L5shRfh.exe Token: SeShutdownPrivilege 4664 L5shRfh.exe Token: SeDebugPrivilege 4664 L5shRfh.exe Token: SeSystemEnvironmentPrivilege 4664 L5shRfh.exe Token: SeRemoteShutdownPrivilege 4664 L5shRfh.exe Token: SeUndockPrivilege 4664 L5shRfh.exe Token: SeManageVolumePrivilege 4664 L5shRfh.exe Token: 33 4664 L5shRfh.exe Token: 34 4664 L5shRfh.exe Token: 35 4664 L5shRfh.exe Token: 36 4664 L5shRfh.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4392 wrote to memory of 3292 4392 L5shRfh.exe 87 PID 4392 wrote to memory of 3292 4392 L5shRfh.exe 87 PID 4392 wrote to memory of 3292 4392 L5shRfh.exe 87 PID 4392 wrote to memory of 4664 4392 L5shRfh.exe 88 PID 4392 wrote to memory of 4664 4392 L5shRfh.exe 88 PID 4392 wrote to memory of 4664 4392 L5shRfh.exe 88 PID 4392 wrote to memory of 4664 4392 L5shRfh.exe 88 PID 4392 wrote to memory of 4664 4392 L5shRfh.exe 88 PID 4392 wrote to memory of 4664 4392 L5shRfh.exe 88 PID 4392 wrote to memory of 4664 4392 L5shRfh.exe 88 PID 4392 wrote to memory of 4664 4392 L5shRfh.exe 88 PID 4392 wrote to memory of 2856 4392 L5shRfh.exe 89 PID 4392 wrote to memory of 2856 4392 L5shRfh.exe 89 PID 4392 wrote to memory of 2856 4392 L5shRfh.exe 89 PID 4392 wrote to memory of 4628 4392 L5shRfh.exe 90 PID 4392 wrote to memory of 4628 4392 L5shRfh.exe 90 PID 4392 wrote to memory of 4628 4392 L5shRfh.exe 90 PID 4392 wrote to memory of 4628 4392 L5shRfh.exe 90 PID 4392 wrote to memory of 4628 4392 L5shRfh.exe 90 PID 4392 wrote to memory of 4628 4392 L5shRfh.exe 90 PID 4392 wrote to memory of 4628 4392 L5shRfh.exe 90 PID 4392 wrote to memory of 4628 4392 L5shRfh.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"2⤵PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 13563⤵
- Program crash
PID:4848
-
-
-
C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"2⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"C:\Users\Admin\AppData\Local\Temp\L5shRfh.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 8722⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4392 -ip 43921⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4664 -ip 46641⤵PID:3388
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjIiIGluc3RhbGxkYXRldGltZT0iMTczOTE4NDMzNiIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNjU1NjQ3OTQxMDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUyMjgyNTAzNTIiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3772