Malware Analysis Report

2025-01-18 01:26

Sample ID 240613-kddf8avdqq
Target Kraken_v1.5.exe
SHA256 e92d56612dc90ee84e96acb77d7b9183d8a16843ee0c401cc685442b95780c78
Tags
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

e92d56612dc90ee84e96acb77d7b9183d8a16843ee0c401cc685442b95780c78

Threat Level: Likely benign

The file Kraken_v1.5.exe was found to be: Likely benign.

Malicious Activity Summary


Program crash

Unsigned PE

NSIS installer

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 08:28

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

NSIS installer

installer
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 08:28

Reported

2024-06-13 08:29

Platform

win10-20240404-en

Max time kernel

7s

Max time network

9s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Kraken_v1.5\Kraken.exe"

Signatures

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Kraken_v1.5\Kraken.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Kraken_v1.5\Kraken.exe

"C:\Users\Admin\AppData\Local\Temp\Kraken_v1.5\Kraken.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 1512

Network

Country Destination Domain Proto
US 8.8.8.8:53 kraken.nswardh.com udp
DK 77.111.240.86:443 kraken.nswardh.com tcp
US 8.8.8.8:53 86.240.111.77.in-addr.arpa udp
US 8.8.8.8:53 11.144.22.2.in-addr.arpa udp

Files

memory/2368-0-0x000000007358E000-0x000000007358F000-memory.dmp

memory/2368-1-0x0000000000D70000-0x0000000000D8A000-memory.dmp

memory/2368-2-0x0000000073580000-0x0000000073C6E000-memory.dmp

memory/2368-3-0x0000000073580000-0x0000000073C6E000-memory.dmp