Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 13:03
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe
Resource
win7v20210408
General
-
Target
SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe
-
Size
897KB
-
MD5
9f910ba7ff05efd30eb1c2316bb488e0
-
SHA1
3b428f5cf8b0c43b8b63bbaf728669a83f66458e
-
SHA256
0c2f78458061b2e848305409a90351eff2c4c31eed1a4667b6366bfdc43ef52a
-
SHA512
5f6300857bce04ef5e883bb219d3f2257acdada1c29cec9dff0d438a8190f784b0c7bde44dbe80adb7f28fefe03c9ec57d0300066bed46b838a91d92a3f7c189
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2096 svchost.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3172-122-0x00000000069C0000-0x00000000069E1000-memory.dmp agile_net behavioral2/memory/3172-125-0x00000000052D0000-0x00000000057CE000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exedescription pid process target process PID 3172 set thread context of 2096 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exepid process 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exedescription pid process Token: SeDebugPrivilege 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exedescription pid process target process PID 3172 wrote to memory of 2096 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe svchost.exe PID 3172 wrote to memory of 2096 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe svchost.exe PID 3172 wrote to memory of 2096 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe svchost.exe PID 3172 wrote to memory of 2096 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe svchost.exe PID 3172 wrote to memory of 2096 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe svchost.exe PID 3172 wrote to memory of 2096 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe svchost.exe PID 3172 wrote to memory of 2096 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe svchost.exe PID 3172 wrote to memory of 2096 3172 SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.MSIL.Kryptik.4625f314.19991.25291.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeMD5
6bdb3091562e7dd2c877472286b6cc46
SHA1122ecbb7a23dc98c61f319cfb060f3cbd407db89
SHA25687e4144b3f50e9a0635ea6a887a20ef0d7b1321a79793f9fa965b8defbdef698
SHA512219d646d5d514c705f801cacc736ca1027613d6612c1d30a8d4156143f5344b125a297080926912e7abf94a09b80cae157ac44773e84dd95946a9feb44b10e94
-
memory/2096-128-0x0000000000400000-0x000000000047E000-memory.dmpFilesize
504KB
-
memory/2096-133-0x0000000000400000-0x000000000047E000-memory.dmpFilesize
504KB
-
memory/2096-129-0x000000000047823F-mapping.dmp
-
memory/3172-119-0x0000000005730000-0x0000000005731000-memory.dmpFilesize
4KB
-
memory/3172-121-0x00000000052D0000-0x00000000057CE000-memory.dmpFilesize
5.0MB
-
memory/3172-122-0x00000000069C0000-0x00000000069E1000-memory.dmpFilesize
132KB
-
memory/3172-123-0x0000000006AC0000-0x0000000006AC1000-memory.dmpFilesize
4KB
-
memory/3172-124-0x0000000006A50000-0x0000000006A51000-memory.dmpFilesize
4KB
-
memory/3172-125-0x00000000052D0000-0x00000000057CE000-memory.dmpFilesize
5.0MB
-
memory/3172-126-0x0000000006DA0000-0x0000000006DAB000-memory.dmpFilesize
44KB
-
memory/3172-127-0x0000000009730000-0x0000000009731000-memory.dmpFilesize
4KB
-
memory/3172-114-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/3172-118-0x00000000052D0000-0x00000000052D1000-memory.dmpFilesize
4KB
-
memory/3172-117-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/3172-116-0x00000000057D0000-0x00000000057D1000-memory.dmpFilesize
4KB