Analysis

  • max time kernel
    123s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/04/2023, 15:21

General

  • Target

    krnl_beta.exe

  • Size

    1.8MB

  • MD5

    3701dc535fb395d6a1fb557a3aeec5e9

  • SHA1

    ef517659229ddc6ecfc02481c3953ac9322dae35

  • SHA256

    ec6df713446a8dd5efb376fbb7b444ed7e09f5cdd98c0494999b64af2e2d5537

  • SHA512

    20dc14387138f913034bd2c265156dca1f36c128c040a99d6904fe6f1830d2f98afb3dcf0553817adb66e480be7d0fb0d7df58f0feb9b007a5a6bab648b081a2

  • SSDEEP

    49152:+P1uB0SVp4+KSxyrRUzS65+x+rnxYr9PC:+Pk0ST4+RgRUzS65+x1ZPC

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\krnl_beta.exe
    "C:\Users\Admin\AppData\Local\Temp\krnl_beta.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Roaming\Krnl\Data\7za.exe
      "C:\Users\Admin\AppData\Roaming\Krnl\Data\7za.exe" x "C:\Users\Admin\AppData\Roaming\Krnl\krnl.7z" -o"C:\Users\Admin\AppData\Roaming\Krnl" -aoa -bsp1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3588
    • C:\Users\Admin\AppData\Roaming\Krnl\Data\7za.exe
      "C:\Users\Admin\AppData\Roaming\Krnl\Data\7za.exe" x "C:\Users\Admin\AppData\Roaming\Krnl\Data\Community.7z" -o"C:\Users\Admin\AppData\Roaming\Krnl\Community" -aoa -bsp1
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1620
    • C:\Users\Admin\AppData\Roaming\Krnl\KrnlUI.exe
      "C:\Users\Admin\AppData\Roaming\Krnl\KrnlUI.exe"
      2⤵
      • Executes dropped EXE
      PID:3884
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\hello fellow user.txt
    1⤵
      PID:3264

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Krnl\Data\7za.exe

      Filesize

      628KB

      MD5

      ec79cabd55a14379e4d676bb17d9e3df

      SHA1

      15626d505da35bfdb33aea5c8f7831f616cabdba

      SHA256

      44a55f5d9c31d0990de47b9893e0c927478930cef06fbe2d1f520a6d6cba587d

      SHA512

      00bbb601a685cbfb3c51c1da9f3b77c2b318c79e87d88a31c0e215288101753679e1586b170ccc9c2cb0b5ce05c2090c0737a1e4a616ad1d9658392066196d47

    • C:\Users\Admin\AppData\Roaming\Krnl\Data\7za.exe

      Filesize

      628KB

      MD5

      ec79cabd55a14379e4d676bb17d9e3df

      SHA1

      15626d505da35bfdb33aea5c8f7831f616cabdba

      SHA256

      44a55f5d9c31d0990de47b9893e0c927478930cef06fbe2d1f520a6d6cba587d

      SHA512

      00bbb601a685cbfb3c51c1da9f3b77c2b318c79e87d88a31c0e215288101753679e1586b170ccc9c2cb0b5ce05c2090c0737a1e4a616ad1d9658392066196d47

    • C:\Users\Admin\AppData\Roaming\Krnl\Data\7za.exe

      Filesize

      628KB

      MD5

      ec79cabd55a14379e4d676bb17d9e3df

      SHA1

      15626d505da35bfdb33aea5c8f7831f616cabdba

      SHA256

      44a55f5d9c31d0990de47b9893e0c927478930cef06fbe2d1f520a6d6cba587d

      SHA512

      00bbb601a685cbfb3c51c1da9f3b77c2b318c79e87d88a31c0e215288101753679e1586b170ccc9c2cb0b5ce05c2090c0737a1e4a616ad1d9658392066196d47

    • C:\Users\Admin\AppData\Roaming\Krnl\Data\Community.7z

      Filesize

      2.2MB

      MD5

      e7e69e3bb82e50d10e17fceb8851f1e3

      SHA1

      ac38d2c834b5ef30feb0b23272ee289779caf14c

      SHA256

      1f70e675fd69fa7d0efe44a2a6cbade8350ebb1cb3a9a18ff824cfd680b35ddd

      SHA512

      ba44f453d75ac413f404b89c5dfd1acbdf95aae10beb65599e7e52ecec7eb3ea82b95a6947fcda38e2cb878eb197714be3f3e3d93d5fc09e83ebb952117ded44

    • C:\Users\Admin\AppData\Roaming\Krnl\Data\krnl.config

      Filesize

      48B

      MD5

      1705af08ed535cba6454e6c72069cc21

      SHA1

      a5fa2373c55b9c06934dd62918553cda63f71bdd

      SHA256

      a8f27919b3bb09a38e6dbd93f9c80518159454e2f4dc0e86f4f7d5d9951ad14f

      SHA512

      bd73d8c4fcad6d079fa5f1c3055956953762c678bb795f1b36a8c8d13e3e02174213875a3a94c6be315af52aa2f3a21a1c329f16601784cd6c1f3fdbf1da6c9f

    • C:\Users\Admin\AppData\Roaming\Krnl\KrnlUI.exe

      Filesize

      1.1MB

      MD5

      39ed86952a1e7926924a18802c0b75e4

      SHA1

      e7ad2a51e62fe68b1a82b17bcde347ab38c09ca3

      SHA256

      b84ceb86e9a8eba4d168f2cc6c9010c93779641e595f900aafe8cfef6165c126

      SHA512

      fe7b93af9bb2621148154389e6c7e1dca54c426df88fd09eab9b33763584a4eee837995d29f7dc1550acc4643c05f03a28b5a25e7019d7a4ceb70c238ae33bad

    • C:\Users\Admin\AppData\Roaming\Krnl\KrnlUI.exe

      Filesize

      1.1MB

      MD5

      39ed86952a1e7926924a18802c0b75e4

      SHA1

      e7ad2a51e62fe68b1a82b17bcde347ab38c09ca3

      SHA256

      b84ceb86e9a8eba4d168f2cc6c9010c93779641e595f900aafe8cfef6165c126

      SHA512

      fe7b93af9bb2621148154389e6c7e1dca54c426df88fd09eab9b33763584a4eee837995d29f7dc1550acc4643c05f03a28b5a25e7019d7a4ceb70c238ae33bad

    • C:\Users\Admin\AppData\Roaming\Krnl\KrnlUI.exe.config

      Filesize

      438B

      MD5

      909df77c711b4133a8f8560483ec2bb3

      SHA1

      8df8505ec0a0dd670b4044c641e772f6ded485a1

      SHA256

      c49ed8da5765f33cc854cf13ee0c33ed65d4eba6843c24d05e321e3b40f4a68c

      SHA512

      0547bae72cd75ad753ddd95c12b7a42b8b3285a3384925cf738c4cc6835c6dd21d16a6206662c4a723fcf348da7e62db3585564782c7daad49b765b43accb28d

    • C:\Users\Admin\AppData\Roaming\Krnl\krnl.7z

      Filesize

      71.1MB

      MD5

      cb244bb2cbed782853d39042fd705b4b

      SHA1

      f9a69f8f2b87134579ca8c50b91a67bd596553fe

      SHA256

      d45f3cc6274717014136b6515c250a966f86cd3ecd3dc2c66b3c4c234831e015

      SHA512

      3d189aba28e8dd59e1e293ad8e962f38518ca11b8aa88b364e06f5ebcbc2626e9963594aa76a59971efbb5a34f6a99e23a1f090def1661abae95ebdd758bf73d

    • \Users\Admin\AppData\Roaming\Krnl\Data\7z.NET.dll

      Filesize

      15KB

      MD5

      982475050787051658abd42e890a2469

      SHA1

      d955e35355e33a9837d00e78c824f6e5792b47f3

      SHA256

      4e193ccda4ef7ec7fc1bc12d7abba225a9af5b4612aa0b67a02324b9da8b268c

      SHA512

      c97b40c82499759e8a11b581004252be618f967153b5a9ce425f9a385746f3a1bdc467686023f36ed11212ea23e1c6b03b4df32cc5dd2a8c4b1d4ab23541c1f6

    • \Users\Admin\AppData\Roaming\Krnl\Data\7z.NET.dll

      Filesize

      15KB

      MD5

      982475050787051658abd42e890a2469

      SHA1

      d955e35355e33a9837d00e78c824f6e5792b47f3

      SHA256

      4e193ccda4ef7ec7fc1bc12d7abba225a9af5b4612aa0b67a02324b9da8b268c

      SHA512

      c97b40c82499759e8a11b581004252be618f967153b5a9ce425f9a385746f3a1bdc467686023f36ed11212ea23e1c6b03b4df32cc5dd2a8c4b1d4ab23541c1f6

    • memory/2364-126-0x0000000005730000-0x0000000005740000-memory.dmp

      Filesize

      64KB

    • memory/2364-146-0x00000000086D0000-0x00000000086DA000-memory.dmp

      Filesize

      40KB

    • memory/2364-153-0x0000000005730000-0x0000000005740000-memory.dmp

      Filesize

      64KB

    • memory/2364-290-0x0000000005730000-0x0000000005740000-memory.dmp

      Filesize

      64KB

    • memory/2364-293-0x0000000005730000-0x0000000005740000-memory.dmp

      Filesize

      64KB

    • memory/2364-121-0x0000000000CB0000-0x0000000000E8A000-memory.dmp

      Filesize

      1.9MB

    • memory/2364-125-0x0000000005730000-0x0000000005740000-memory.dmp

      Filesize

      64KB

    • memory/2364-124-0x0000000009680000-0x00000000096B8000-memory.dmp

      Filesize

      224KB

    • memory/2364-123-0x0000000008720000-0x0000000008728000-memory.dmp

      Filesize

      32KB

    • memory/2364-122-0x0000000005730000-0x0000000005740000-memory.dmp

      Filesize

      64KB