Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2024 18:53

General

  • Target

    KRONIXSOLUTIONS 13.1.exe

  • Size

    18.1MB

  • MD5

    9b354b7daf7e74799711371e66d59bc0

  • SHA1

    55333bdd10524f926c9d254f94335547052fb0fe

  • SHA256

    f204937262963f7c03315accfc7219292957f23e987270250828792dcbef6077

  • SHA512

    83657233346f913dbcccb94cb804e708b5b3f959987334fb5484d4718fee01e08e1084bc95be8783c1ee66b5b91f5cbd77cd56a426920795f4196c966f374b9b

  • SSDEEP

    393216:y83OSNCRwvSx4vKskvYNR2hgQ3ieD+UQBcHBJvjYNl0EQuKTCiuOW:ZejqSmizrAcH7jCK8

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

Processes

  • C:\Users\Admin\AppData\Local\Temp\KRONIXSOLUTIONS 13.1.exe
    "C:\Users\Admin\AppData\Local\Temp\KRONIXSOLUTIONS 13.1.exe"
    1⤵
    • Checks BIOS information in registry
    PID:800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/800-0-0x00007FF705090000-0x00007FF7062A9000-memory.dmp

    Filesize

    18.1MB

  • memory/800-1-0x00007FF9C93F0000-0x00007FF9C95E5000-memory.dmp

    Filesize

    2.0MB

  • memory/800-2-0x00007FF705090000-0x00007FF7062A9000-memory.dmp

    Filesize

    18.1MB

  • memory/800-3-0x00007FF9C93F0000-0x00007FF9C95E5000-memory.dmp

    Filesize

    2.0MB