Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2023 19:09

General

  • Target

    Kryptex.exe

  • Size

    365KB

  • MD5

    319e413d3208e2f20e72d3c0150ccbe4

  • SHA1

    036c72d7aef21caecf0401ee7da132d2a56533ef

  • SHA256

    02e127954ea7ec51aafffb27723dbea3a43c040dac796d5ad1957e6f000e5670

  • SHA512

    a23af17d029bd60e0bac7034e6e4b60f5999a741b560c1f61fe9748983b0d612b0b0d4cd642a80501406c2b21614a75908a0e387857a06fbbf15663f78b1cc67

  • SSDEEP

    6144:iBe73lX4CEB/eeXvYPbluzFOIs2niR1tJk+uPUYJBnMI:ce7VyXvYPblDh2EXkRBj

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kryptex.exe
    "C:\Users\Admin\AppData\Local\Temp\Kryptex.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4876-133-0x0000000000AF0000-0x0000000000B52000-memory.dmp

    Filesize

    392KB

  • memory/4876-134-0x00007FFA9B3A0000-0x00007FFA9BE61000-memory.dmp

    Filesize

    10.8MB

  • memory/4876-135-0x000000001B6C0000-0x000000001B6D0000-memory.dmp

    Filesize

    64KB

  • memory/4876-136-0x00007FFA9B3A0000-0x00007FFA9BE61000-memory.dmp

    Filesize

    10.8MB

  • memory/4876-137-0x000000001B6C0000-0x000000001B6D0000-memory.dmp

    Filesize

    64KB