Analysis

  • max time kernel
    70s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2024 14:33

General

  • Target

    KRNL-REBORN/krnlss.exe.xml

  • Size

    202B

  • MD5

    0ed4b3831ff5e91dff636145f68aac4c

  • SHA1

    2d1140812945dc1b9e400a88c911803639cb2e49

  • SHA256

    03962ae5a55dfc70e2717771a9a7aa37b956b2c5b4c62e3cff9fe24360250347

  • SHA512

    4039d0272678777ba6fa496baf875050bd4c29352fffd37af8c3c07fb2abeedc54ba04a3dd085b491d848e951ccfcbd67ec7ba50a10ec0c624df45e98c18bf1c

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\krnlss.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0da6ae3a9c0eaafc35a1d99737a16fe

    SHA1

    fe535a809c37ca88800372571e78f76ff4d23ca6

    SHA256

    18a146cd859c8bf1d81078ea45579930bee4c21cc40a57fdcc4f2356b0a669a2

    SHA512

    19ddce2fe5005fa117077726d46c63364ac6b0686a736971c0f0f68b1b267b9fca819c04b606bba6e85a992e9614e7bdf265f1c564234538f124702744e842c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ed0a1544f6da13a3e00502811f39342

    SHA1

    7f2ec1f8b679edee256feccaf46d8de2d982db8d

    SHA256

    e7120304b97fcffe7e38dbb77c2e5c3ab20fdaa991100304e8022733e1359875

    SHA512

    b1d71d922f0eaba9fcec162cfe85d6ed35ca7eede603c267edf38ae302469bba183505ef230ea15f14072b9cfe4ed6985eef1fa09902ad6a8e6ef1bca249bba8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4a3035752ed57feb933f57d5451593f

    SHA1

    3b7c12791889efbb1fe26fdc280c790bc0a60d3d

    SHA256

    1a115d70face91691b619b41ad40b1bcc0581e6707b7af77c89f2080ec304ab1

    SHA512

    cc4e208397eedd70147eb9206008223c682cc57cb90c26b89d54bb46b7c989c6655c9b4c0b809dbd18970bc18d7ff73ca2421290f3a10707b8660546307e3c60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07392fb5f1c9a21e6d2be7733f365bb2

    SHA1

    aaf30fa180bcef39dd55958933e59fc91f7b366a

    SHA256

    65b5cb01a97f8d2375d0a55385a7b553a39bada944f3a1d7cc12bc7fab527578

    SHA512

    0c767003b40d1dbc743353fbc4f17afd056ee184a40c767c77d1e1b38c5e8210866f682e40f3b288be4d4079f249213be4921ee00a17c32fc0c1763ead952ece

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae459bad0fc1aa94ad58e0b3b32e5f7c

    SHA1

    a36c33ed065be9a82da723420daaa491cba9d223

    SHA256

    931b382834d8869f8dde8af3763d1ae2ef6d63099f91d7a8f678521ea7781878

    SHA512

    bc4704b30c370f3e5bba81d9efe23ee848e17fe72986e00446e2e189247b8f9dd2c87543a4c7f9e726ed97a7aab7d6be00a958bc404db50dc14f82020c526d7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0cc8236bfa708a23fc6f6157b47331f

    SHA1

    1c34670ff41fdb9d970484fb72d1c0fe29cda984

    SHA256

    173ac3800820709c5f6b415a30aee705b65226d0686b75a32d2ec61ca8d6c761

    SHA512

    b10e7685fab9d960af31474c7f9c0b8778a73ef7fc7bfa4bb363b9bcb5f8e3d39082fab12a274a88e4b67e4cef71dbadb1a1df4876da9046d591d4861cb0220c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7aca7dc39614c6b5a3ed5c62154fd30

    SHA1

    071b11f8a89dae3935ad8b310d7adc7410ff7e6d

    SHA256

    426ea9ff570ffe384ce999e1b74dc81af6506292b322645b103a669ac3775329

    SHA512

    283faf09239149deaad6f10d54677229c00cdca0469829ba55ff8474a9f8ab4007898aef87ab7824695592e42b1439b9ae65d04d2737a7781b59dd9f8e4d46a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35fbb2f5002417a6358543b50fe219d7

    SHA1

    53375678d6614437d54f823a142a888772ea148c

    SHA256

    e4157251fc8f9c408ac9e73bc158024d2451f1b81c3bcec03e2df19fad0d0b80

    SHA512

    04378d89026b857afb7d6e167f8cfc15110ea54bb2adffab8a1571f6137b0e6cc61947bd88855c97325be20aa1fd4e87f7d4777d426b0a5e7a5c82077b3a15c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0587564f29c5ca6e1f559ae17667a15f

    SHA1

    bf44e77c842e05bbde51f8f6cfa2dc352b65b317

    SHA256

    5429e0df7975240b57668cbf63d5303a2418d394d85c2c2fc198128c2ef2f30d

    SHA512

    0b161763ffb883466d88f4e4cbb1b65854ed8a491fe8429c51ee359b5b03e475d317644216e6e4b131e4c574cf890eb0165686d68b1dbd424bcf508b3be86ae8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b5a6949dfe3466993e7e434a8e11ba2

    SHA1

    3cadc9f52032e47b56e9514ad58cc5821edb64d7

    SHA256

    de5bb57c81a36b461c1ab7a2cd5a5a8fe63c4a36ffd7c4e764ea72ccb9e47c6d

    SHA512

    08a6eec45b1ec72442efebd9e230b8dacc56ff05cb75f5e1b67d2ab9818cdd9f2b891ca098dd3f58d75d3396f97410af2bbbc0b16a0170f1cdd49a144d16b01a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4897b747dc67f92cc0e7c89a1a687106

    SHA1

    c07692e953461aedfadccd14eca597fb728ea51e

    SHA256

    f2dcb9d909bf72af8839bb85c3f633f803d607574e2ea686de14cd7085944fb2

    SHA512

    fb6747ec8effe7b8062538cd78da10938d5e9ab2e77e36cd3e79b409a6b4f0a507552d52cb3a15248a61a4bbbbb788bae2775cdbd05b77126b43162e7d89bd08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e9e63fc2ec79e5cbfa4ed53d404af96

    SHA1

    4e0c2b4314047e4b2808118444b8c973ec5ee367

    SHA256

    31d3dd776a42dd56b4a90b70016bbfcdeed53925590df8519ebf4b670d05d8bf

    SHA512

    a9814f3e14e2e129dfcb4ba0adf10f8d743c6253fe31393c6eafbcbe83eee1767e77c73b80cd84e83023b07a2e36419be34866cfb70e598c1e0d4948f4846421

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a3a16b47de2f84436d4a88e379ae659

    SHA1

    43f9aaff4d6725e9f5f5fcf4843abea8137bd9ff

    SHA256

    20c442f4179de33ac9f1887b9a13944df9996a4fae1cce2446645828040a280d

    SHA512

    357258d5c8a93c6e7d776539672674959b9ffafdfd97b8b5ce628b3ea7499336511b756e4f8a381e4f87eb14a74fd63062d377e62c3db8c7a791991679fcdd71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2037ae5e6c52f4da4bb7af32c138c6b3

    SHA1

    f2448a0f9c9ef36291b43909a2b30fe1584084eb

    SHA256

    aa13269929ecbf1998f2ecbf957c582e28a815310a6a3fb1a57bed7b52c1359f

    SHA512

    5ab39df34822e27d0bf1dac8f2eb20739b1c44e49da0a4dde7fac7cb4621afda61b694ba67083dd1db6df3365442aab443cf7fc874f49dabd3db29b67bfd3288

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c564f435b7e893b6f726d4cbfdcc126

    SHA1

    c1de0901953ffc1e5dc111dd9ba86cc612c02bd7

    SHA256

    8146d44e83868a1de62f72095d2973e1e78e7b69545f859bff8d1c2db58877b9

    SHA512

    8f27989c368beb5f5f2c09d3fec2de1b15b12def9a74dce7e83c438b194aeefaa97627226123b7149ddcde744fdf9fc8ec97b6ae790aedfe2ebbab81eac4a34a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73cfc918cfc6c8fcec94a9c203d364a3

    SHA1

    220750b71d12e356c9f7ff68b4d9a83991e70140

    SHA256

    446b02612fa13a94134d4460f119c40008bbc672d2511392ed790e28637068a9

    SHA512

    9dbeae3e0b0b5e5d0c6aa3a2ac9920f9e28f6f5ca40efa659ff3f82bd7e7110b5e78406512c451c2a81389a273909a7e51da01e828076602a2abc65031088e28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60318950b5b7c508d957053e47f61b61

    SHA1

    172b0dc985cd115eb76d1adbd0970fb24499e558

    SHA256

    f3f767bc5b65fc5ea02a9e723322b946c9c3983f9682c7dc77abfa43d7613b00

    SHA512

    30c25b2ee6f7879d3a89b9635e0df5a3d292878a518d43e9da0cc7c3f5a88bdecde5f37b8848751cd6638408f93ab1f9d191cdabe76ef8f543ac4617ccf7f515

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97c0573d80a9c7df38bfd8956229becb

    SHA1

    958080140793ed06423dc720c2c021aca46d39ce

    SHA256

    87d36fa70bf2ff26a9d82d092ec1066d454ae48f4f67905d0b7a75de5ebdeb1a

    SHA512

    9818ac107fd88ce9951b3699d0fc16155aced90bf5509085ee4aa050030a717426e2031a496a7bdec4e37474ae60c4b9381cc1184fddbe053096d210e4bbb862

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd061250dfc07e3dbd260d264102153c

    SHA1

    2c4513d0b27e7ccd7dcd2daefa7b06dc1a3048df

    SHA256

    b628bf40d095b8211a555063c8c0014279f5a28314550b1e16c367126482bd43

    SHA512

    3d59696dd5fe352da7d0c5d2d149f4700228344cb33575f8929994d0254ff6d979b0bce03467eb077f46af31ccd779e990ce9ae1f99e0d13f890471c6b168121

  • C:\Users\Admin\AppData\Local\Temp\Cab142E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar154B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b