Overview
overview
3Static
static
3KRNLWRD/Bu....3.dll
windows7-x64
1KRNLWRD/Bu....3.dll
windows10-2004-x64
1KRNLWRD/Sc...ET.dll
windows7-x64
1KRNLWRD/Sc...ET.dll
windows10-2004-x64
1KRNLWRD/autoexec.lnk
windows7-x64
3KRNLWRD/autoexec.lnk
windows10-2004-x64
3KRNLWRD/injector.dll
windows7-x64
1KRNLWRD/injector.dll
windows10-2004-x64
1KRNLWRD/krnl.dll
windows7-x64
1KRNLWRD/krnl.dll
windows10-2004-x64
3KRNLWRD/krnl.exe
windows7-x64
3KRNLWRD/krnl.exe
windows10-2004-x64
1KRNLWRD/workspace.lnk
windows7-x64
3KRNLWRD/workspace.lnk
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 17:51
Static task
static1
Behavioral task
behavioral1
Sample
KRNLWRD/Bunifu_UI_v1.5.3.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
KRNLWRD/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
KRNLWRD/ScintillaNET.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
KRNLWRD/ScintillaNET.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
KRNLWRD/autoexec.lnk
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
KRNLWRD/autoexec.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
KRNLWRD/injector.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
KRNLWRD/injector.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
KRNLWRD/krnl.dll
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
KRNLWRD/krnl.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
KRNLWRD/krnl.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
KRNLWRD/krnl.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
KRNLWRD/workspace.lnk
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
KRNLWRD/workspace.lnk
Resource
win10v2004-20240426-en
General
-
Target
KRNLWRD/krnl.exe
-
Size
1.2MB
-
MD5
fb3a52d1045b1a0298668f2d77680306
-
SHA1
e16d5085977f1b895b7b2a046570b2da474add86
-
SHA256
8869c44219364f911548cb18da0cc6413b3277d3a8a8df18d0a521b558830d6e
-
SHA512
e19ce4c86ef8bf2ab25b4da67bf83acef5a8e688abfd3f96e8dec8169ce410c833df7685b6fb0b7489cf90ca51c56cd7264e8b2a94865aea5e5dacd4c5b7f44f
-
SSDEEP
12288:LMqP5hP0pwI7+G70EE/0GGGGGGhGGGGxdoM43nwVkokbtkK:LZEpRC4ysGGGGGGhGGGGx1Vpstz
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1756 2244 WerFault.exe 27 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 chrome.exe 2720 chrome.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe Token: SeShutdownPrivilege 2720 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2876 rundll32.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe 2720 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1756 2244 krnl.exe 29 PID 2244 wrote to memory of 1756 2244 krnl.exe 29 PID 2244 wrote to memory of 1756 2244 krnl.exe 29 PID 2244 wrote to memory of 1756 2244 krnl.exe 29 PID 2720 wrote to memory of 2736 2720 chrome.exe 31 PID 2720 wrote to memory of 2736 2720 chrome.exe 31 PID 2720 wrote to memory of 2736 2720 chrome.exe 31 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2548 2720 chrome.exe 33 PID 2720 wrote to memory of 2872 2720 chrome.exe 34 PID 2720 wrote to memory of 2872 2720 chrome.exe 34 PID 2720 wrote to memory of 2872 2720 chrome.exe 34 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35 PID 2720 wrote to memory of 2236 2720 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\KRNLWRD\krnl.exe"C:\Users\Admin\AppData\Local\Temp\KRNLWRD\krnl.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 5722⤵
- Program crash
PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6729758,0x7fef6729768,0x7fef67297782⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:22⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:82⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:82⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:12⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:12⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:22⤵PID:784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3016 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:12⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3488 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:82⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3660 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:82⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3644 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3816 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3992 --field-trial-handle=1288,i,15290406807445393784,4764767434823055076,131072 /prefetch:12⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1408
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2032
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" pnidui.dll,NwCategoryWiz {0ceebf1f-2565-4a2c-82d1-c630d0e51d7f} 01⤵
- Suspicious use of FindShellTrayWindow
PID:2876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
144KB
MD5c5a4bae12a8f444bc7e918de042b74a1
SHA19ab8397acad568cf30f87a31538975a4bc398fa9
SHA256f09d49d7034d68e32ec832fd95accd97c6d5433dfbec4f68d85b704bdcb9cedb
SHA512a9d8d9cd0d4e0f627038bdb33e04d02fad307ed54b65362f307db7860ddc5cc886787aee074f8d06699e87b16d4bb0db72fce97cd4f520a58aa86e8794156dd0
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
6KB
MD585269de68db9f2d1440a9eb760764dad
SHA11810d9365a130bf25d001b911db7055331534cb7
SHA2567aa6ac2b63ad781e5ef98bb65310ae9a8a5f873159bb99a7190774d41afd6ce7
SHA512889fe6df5c5569b7787cbb27db9e3c63c63c5a9fcaaf9cb094b164b7de5828d388594d06e75d11a7aff052ee68955b7bb24241c87cf0f62477edd77fbf541798
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
144KB
MD5b62dd8a420fc4e1c8eaccbf632a6dc53
SHA11acc46e84ad5803f42f57f1e519c1701f6375ee5
SHA256eac6211b465b24b8490d8fb2aea8ac876f08558818cc946ce0541a48a5dd0708
SHA512f608127412293e05a0f9d8a35fc17d67da103cfcf8b6988dc4f562a1fcca64d5d08048804f43ac61b75adf9c39386f7fe2abd42ded169d772e87660f7368479a