Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2023 19:10

General

  • Target

    Kryptex.exe

  • Size

    365KB

  • MD5

    319e413d3208e2f20e72d3c0150ccbe4

  • SHA1

    036c72d7aef21caecf0401ee7da132d2a56533ef

  • SHA256

    02e127954ea7ec51aafffb27723dbea3a43c040dac796d5ad1957e6f000e5670

  • SHA512

    a23af17d029bd60e0bac7034e6e4b60f5999a741b560c1f61fe9748983b0d612b0b0d4cd642a80501406c2b21614a75908a0e387857a06fbbf15663f78b1cc67

  • SSDEEP

    6144:iBe73lX4CEB/eeXvYPbluzFOIs2niR1tJk+uPUYJBnMI:ce7VyXvYPblDh2EXkRBj

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Kryptex.exe
    "C:\Users\Admin\AppData\Local\Temp\Kryptex.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    PID:1040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1040-54-0x0000000000190000-0x00000000001F2000-memory.dmp

    Filesize

    392KB

  • memory/1040-55-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp

    Filesize

    9.9MB

  • memory/1040-56-0x00000000003D0000-0x0000000000450000-memory.dmp

    Filesize

    512KB

  • memory/1040-57-0x000000001AE80000-0x000000001AEDC000-memory.dmp

    Filesize

    368KB

  • memory/1040-58-0x000007FEF5D50000-0x000007FEF673C000-memory.dmp

    Filesize

    9.9MB

  • memory/1040-59-0x00000000003D0000-0x0000000000450000-memory.dmp

    Filesize

    512KB