Overview
overview
7Static
static
3KRNL-REBOR....3.dll
windows7-x64
1KRNL-REBOR....3.dll
windows10-2004-x64
1KRNL-REBOR...ET.dll
windows7-x64
1KRNL-REBOR...ET.dll
windows10-2004-x64
1KRNL-REBOR...ec.lnk
windows7-x64
3KRNL-REBOR...ec.lnk
windows10-2004-x64
3KRNL-REBOR...rn.dll
windows7-x64
1KRNL-REBOR...rn.dll
windows10-2004-x64
3KRNL-REBOR...ss.exe
windows7-x64
7KRNL-REBOR...ss.exe
windows10-2004-x64
7cstealer.pyc
windows7-x64
3cstealer.pyc
windows10-2004-x64
3KRNL-REBOR...xe.xml
windows7-x64
1KRNL-REBOR...xe.xml
windows10-2004-x64
1KRNL-REBOR...ce.lnk
windows7-x64
3KRNL-REBOR...ce.lnk
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 06:14
Behavioral task
behavioral1
Sample
KRNL-REBORN/KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
KRNL-REBORN/KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
KRNL-REBORN/KRNL-REBORN/ScintillaNET.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
KRNL-REBORN/KRNL-REBORN/ScintillaNET.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
KRNL-REBORN/KRNL-REBORN/autoexec.lnk
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
KRNL-REBORN/KRNL-REBORN/autoexec.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
KRNL-REBORN/KRNL-REBORN/krnl-reborn.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
KRNL-REBORN/KRNL-REBORN/krnl-reborn.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
KRNL-REBORN/KRNL-REBORN/krnlss.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
KRNL-REBORN/KRNL-REBORN/krnlss.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
cstealer.pyc
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
cstealer.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
KRNL-REBORN/KRNL-REBORN/krnlss.exe.xml
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
KRNL-REBORN/KRNL-REBORN/krnlss.exe.xml
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
KRNL-REBORN/KRNL-REBORN/workspace.lnk
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
KRNL-REBORN/KRNL-REBORN/workspace.lnk
Resource
win10v2004-20240611-en
General
-
Target
KRNL-REBORN/KRNL-REBORN/krnlss.exe
-
Size
13.3MB
-
MD5
f4e7c776a1782f05a43b037cfac70d15
-
SHA1
c09e2c11b58555cd047793d26622e0c4ca1ad7b2
-
SHA256
fe1852241114c26f7fbe3e9279c1031156dbdfbdc6063254e40849b0eb1e42af
-
SHA512
31fd5000b30256255a24e446a2b79188c69da04799ec4825f573e35bea17456dd0e443bdee4256f4b517d936d597349790f2c0d4b93d0e2d2c12a3f485f9f7f7
-
SSDEEP
393216:AEkZQND/vCKL2Vmd6m0JJVAzDak/ikzndpzl8HhuPpCdiYh:AhQ9X7yVmdYDAvLpfKP8Yh
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2916 krnlss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2916 2040 krnlss.exe 28 PID 2040 wrote to memory of 2916 2040 krnlss.exe 28 PID 2040 wrote to memory of 2916 2040 krnlss.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\KRNL-REBORN\krnlss.exe"C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\KRNL-REBORN\krnlss.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\KRNL-REBORN\krnlss.exe"C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\KRNL-REBORN\krnlss.exe"2⤵
- Loads dropped DLL
PID:2916
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD519e6d310c1bd0578d468a888d3ec0e3d
SHA132561ad9b89dc9e9a086569780890ad10337e698
SHA256f4609ec3bbcc74ed9257e3440ec15adf3061f7162a89e4e9a370e1c2273370a1
SHA5124a8332c22a40a170ea83fc8cfd5b8a0ed0df1d59fd22ebe10088ba0be78cc0e91a537d7085549a4d06204cbe77e83154a812daed885c25aa4b4cb4aca5b9cc85