Resubmissions
29-04-2024 05:30
240429-f7dxmabg58 1029-04-2024 05:26
240429-f4wchabf96 820-04-2024 15:56
240420-tdbgascb67 1019-04-2024 21:04
240419-zwwsvafe74 10Analysis
-
max time kernel
30s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 05:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/davon21121/krampus-cracked/blob/main/celex.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://github.com/davon21121/krampus-cracked/blob/main/celex.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://github.com/davon21121/krampus-cracked/blob/main/celex.exe
Resource
win10v2004-20240419-en
General
-
Target
https://github.com/davon21121/krampus-cracked/blob/main/celex.exe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3036 chrome.exe 3036 chrome.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe Token: SeShutdownPrivilege 3036 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe 3036 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3060 3036 chrome.exe 28 PID 3036 wrote to memory of 3060 3036 chrome.exe 28 PID 3036 wrote to memory of 3060 3036 chrome.exe 28 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 2440 3036 chrome.exe 30 PID 3036 wrote to memory of 304 3036 chrome.exe 31 PID 3036 wrote to memory of 304 3036 chrome.exe 31 PID 3036 wrote to memory of 304 3036 chrome.exe 31 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32 PID 3036 wrote to memory of 1632 3036 chrome.exe 32
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/davon21121/krampus-cracked/blob/main/celex.exe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72e9758,0x7fef72e9768,0x7fef72e97782⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1360,i,15891876599530540548,18194632207758123613,131072 /prefetch:22⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1360,i,15891876599530540548,18194632207758123613,131072 /prefetch:82⤵PID:304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1544 --field-trial-handle=1360,i,15891876599530540548,18194632207758123613,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2220 --field-trial-handle=1360,i,15891876599530540548,18194632207758123613,131072 /prefetch:12⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2232 --field-trial-handle=1360,i,15891876599530540548,18194632207758123613,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1360,i,15891876599530540548,18194632207758123613,131072 /prefetch:22⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3476 --field-trial-handle=1360,i,15891876599530540548,18194632207758123613,131072 /prefetch:82⤵PID:1604
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f03fc51b26b2a7bf3d30f9e8c15a0ea2
SHA18ae349b06cee9dde9e5e99f75d2cae47a3b4e6c9
SHA256fa4ae3642b2b3cc40b1998a1673f67b02986eaf4dcd8c7a7d4b3636b36fd7465
SHA512d297d9e1cf5948739e255feea2db31ed58d6a2d9c8d19f81acb0c500740e7ac398a203a6251ec328284c40d783394f38eaaa213bd497094b65b88b7dc5a7f5b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbdf1e99e457b20fe469b1217a936de4
SHA1825140c088a1eaee18fe8698d859ae894db1d74e
SHA2560fa5029dd3fdc4986fd6f82e3877adc2c484520273226c82b62a6c74a6200ce6
SHA512b8d5403bc4dbdd1f9a12c6900526b39508681ec4bbedfbfe941c2aff206c3043e6ed4639e5197ae77c10b18cd04405c8bbf529a84ab8dbc3e9680b9adc088a3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545d8989850b74b5fe5e61dde58aaea30
SHA13ce1f5eac2b2e662e9ea575a6f8a06398e842e93
SHA256d9938a2f65c9d6e133f5a6c834d42e5514bcc72fe3ce8fbc8fa9e1d3598a9027
SHA5124890684c26055d184b65ecf3798c76e6bdae6ed4e22b00c25deaf098a0ca978a520094f2ee55b16101e9b0fb23348212c446443899caed25d2872d602287b963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5454f5a0e182066bf4176e736526565fa
SHA134a6687280a88131c4ea2d9e77806f66a579e4d5
SHA25637751d96dfee391e683321fe96b453a87a3c715bd566210621e85ac0b0e7f697
SHA512103af6a8eceff86238c22675fb205720e0ed47f9e62fa0f783cc0ffaa9c24b071257ff3aa0b39f2a6784a2742432edaaff582f37f7f9ee2e2faf0f9fb2217de7
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
986B
MD5abc46082a375bb2c3b9440ca7f4ee81b
SHA1ae972ea2172a78054929a775b45308acbc7abb99
SHA2561a7413540876984ba72fad52a97d23c20ff38349655adeb6919a14317e746365
SHA5120ec4d8d40caaedc1915dd4d69989d78917add6bd653bb5ce92d4bf9e31b4a752d35a335237b6d41808e4544b67c201a1154de6a70bcf38b119f44c0d4d4875f8
-
Filesize
526B
MD55bb97194f98206f75fddc7b995fe64ab
SHA1bc2f1a030937e0a5a71cb168731961cd5fc94cf1
SHA256cfed2ed5c2671a187bc7f5f4692fc0801b5080cd732b74ca9cb48185e264fa0b
SHA512ec0963a034dc545d6f3e26e79822b77c999cf9d6c2279247b26c4e67f80fde354e17133b1ebd7fdc521d6cf6861eaff1af290169dac559fcbd37364d2b968076
-
Filesize
5KB
MD53f5e5a3f11c3b530b5ff7a934f291daa
SHA1fe0f79fe401f8c2d46ea36b3f853b5019256cda8
SHA25645a3e86546995b6820b6ddfc585f7a4a6671abb4ead5fd8957a320cae4532f25
SHA5129f42a38cd2fe54baabffb47dc934ca88681cca823167b34b854499f0fbad5a3b2c2b4cf59c82149b7c41f03bebe4478fbab68b980e28c5f0601869f1f63a4ef4
-
Filesize
5KB
MD594f03f50a78e945fc7e132482c188047
SHA11e98d9fbffa6c9472f53ab822c64327ebd382ef0
SHA25623958f2c07b42e6e2c410176f16629fc39de1994f633e5fde6f61d1c3b5c4e2c
SHA51223fcda8dc74e1aa63ffc18e6b745df54d1a2618ac232195a1733ca630f984b4dd17a83e8761c74584f0c17211aee80174e9af3405941d012730e0a778718578f
-
Filesize
6KB
MD5de977b9bbc4ba4f3bd0145a3d07aaab0
SHA1a48def757357fdb4630c8bf0244b43cf7c01b941
SHA2562d9e0ef92fd3933a4d1ce041f5e348bb16f90d9cb27ed6b59501a059a49be694
SHA51201138e12c5f8dd8c0817d4cd0a4e32c88bba933367dae9ad2c82dd2fdcbcf53f2125de53a8f5e03759b921236ee95b44e79266b48f924241612579b4ac965d13
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a