Overview
overview
3Static
static
KRNLWRD/Bu....3.dll
windows7-x64
1KRNLWRD/Bu....3.dll
windows10-2004-x64
1KRNLWRD/Sc...ET.dll
windows7-x64
1KRNLWRD/Sc...ET.dll
windows10-2004-x64
1KRNLWRD/injector.dll
windows7-x64
3KRNLWRD/injector.dll
windows10-2004-x64
3KRNLWRD/krnl.dll
windows7-x64
1KRNLWRD/krnl.dll
windows10-2004-x64
3KRNLWRD/krnl.exe
windows7-x64
3KRNLWRD/krnl.exe
windows10-2004-x64
3KRNLWRD/kr...xe.xml
windows7-x64
1KRNLWRD/kr...xe.xml
windows10-2004-x64
1Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/12/2022, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
KRNLWRD/Bunifu_UI_v1.5.3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
KRNLWRD/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
KRNLWRD/ScintillaNET.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
KRNLWRD/ScintillaNET.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
KRNLWRD/injector.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
KRNLWRD/injector.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
KRNLWRD/krnl.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
KRNLWRD/krnl.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
KRNLWRD/krnl.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
KRNLWRD/krnl.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
KRNLWRD/krnlss.exe.xml
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
KRNLWRD/krnlss.exe.xml
Resource
win10v2004-20220901-en
General
-
Target
KRNLWRD/injector.dll
-
Size
1.2MB
-
MD5
a1b9c6fdb702f4456a385ee93a1a77eb
-
SHA1
283b10148e08fa8bd6d8ec47f8e62c556fb768cc
-
SHA256
4cd782cfc5344a942f3f0a61c021122ded48b5e175de76f393419901708c04d4
-
SHA512
447ed5b2656fdb225c799270421b9e3459ac44ae7be06a84bd6c67c2304b8076eb562e3d191e8a43190338fa4e67a8b3cf7afd3eb788c707497cb090b98af0ca
-
SSDEEP
24576:F4L8ZNLC0RaGGeeh9dWHjQyAToCF+i15b1lpJyIOYCdcb65Jhz+:Fxf89ajQyAToCF+iVJyIHocb65Hz+
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4092 3920 WerFault.exe 81 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3920 rundll32.exe Token: SeLoadDriverPrivilege 3920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 884 wrote to memory of 3920 884 rundll32.exe 81 PID 884 wrote to memory of 3920 884 rundll32.exe 81 PID 884 wrote to memory of 3920 884 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\KRNLWRD\injector.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\KRNLWRD\injector.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 6283⤵
- Program crash
PID:4092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3920 -ip 39201⤵PID:1044