Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2023 19:08

General

  • Target

    Kryptex.exe

  • Size

    365KB

  • MD5

    319e413d3208e2f20e72d3c0150ccbe4

  • SHA1

    036c72d7aef21caecf0401ee7da132d2a56533ef

  • SHA256

    02e127954ea7ec51aafffb27723dbea3a43c040dac796d5ad1957e6f000e5670

  • SHA512

    a23af17d029bd60e0bac7034e6e4b60f5999a741b560c1f61fe9748983b0d612b0b0d4cd642a80501406c2b21614a75908a0e387857a06fbbf15663f78b1cc67

  • SSDEEP

    6144:iBe73lX4CEB/eeXvYPbluzFOIs2niR1tJk+uPUYJBnMI:ce7VyXvYPblDh2EXkRBj

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kryptex.exe
    "C:\Users\Admin\AppData\Local\Temp\Kryptex.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    PID:2344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-53-0x00000000010D0000-0x0000000001132000-memory.dmp

    Filesize

    392KB

  • memory/2344-54-0x000007FEF5050000-0x000007FEF5A3C000-memory.dmp

    Filesize

    9.9MB

  • memory/2344-55-0x000000001B1D0000-0x000000001B250000-memory.dmp

    Filesize

    512KB

  • memory/2344-56-0x00000000005B0000-0x000000000060C000-memory.dmp

    Filesize

    368KB

  • memory/2344-57-0x000007FEF5050000-0x000007FEF5A3C000-memory.dmp

    Filesize

    9.9MB

  • memory/2344-58-0x000000001B1D0000-0x000000001B250000-memory.dmp

    Filesize

    512KB