Overview
overview
7Static
static
3KRNL-REBORN.zip
windows7-x64
1KRNL-REBORN.zip
windows10-2004-x64
1KRNL-REBOR....3.dll
windows7-x64
1KRNL-REBOR....3.dll
windows10-2004-x64
1KRNL-REBORN/README.md
windows7-x64
3KRNL-REBORN/README.md
windows10-2004-x64
3KRNL-REBOR...ET.dll
windows7-x64
1KRNL-REBOR...ET.dll
windows10-2004-x64
1KRNL-REBOR...ec.lnk
windows7-x64
3KRNL-REBOR...ec.lnk
windows10-2004-x64
3KRNL-REBOR...rn.dll
windows7-x64
3KRNL-REBOR...rn.dll
windows10-2004-x64
3KRNL-REBOR...xe.xml
windows7-x64
3KRNL-REBOR...xe.xml
windows10-2004-x64
1KRNL-REBOR...02.exe
windows7-x64
7KRNL-REBOR...02.exe
windows10-2004-x64
7main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3KRNL-REBOR...ce.lnk
windows7-x64
3KRNL-REBOR...ce.lnk
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 14:33
Behavioral task
behavioral1
Sample
KRNL-REBORN.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
KRNL-REBORN.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
KRNL-REBORN/README.md
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
KRNL-REBORN/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
KRNL-REBORN/autoexec.lnk
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
KRNL-REBORN/autoexec.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
KRNL-REBORN/krnl-reborn.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
KRNL-REBORN/krnl-reborn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
KRNL-REBORN/krnlss.exe.xml
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
KRNL-REBORN/krnlss.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
KRNL-REBORN/krnlss_v102.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
KRNL-REBORN/krnlss_v102.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
main.pyc
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
main.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
KRNL-REBORN/workspace.lnk
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
KRNL-REBORN/workspace.lnk
Resource
win10v2004-20240802-en
General
-
Target
main.pyc
-
Size
94KB
-
MD5
46d5c1a7ce50eb4892ed7c755195cbee
-
SHA1
b7c5e91d0417b42ac5d687bab5e616d097ac4a1e
-
SHA256
6aa2ef60e8fe06d3cb5ba40c85905b2ee8e5d6ef174dfda20ad7a4b6e426a0e0
-
SHA512
19c6f84e1e3e2e65ee06a72b9a8780d5bfc82b8c4467b00af5ce7f5e6f7beb0d002fa31d23321b648b4f43a906b15cba43be7dcd72d0321b5ede263963680c18
-
SSDEEP
1536:BiVKHviGboAgjl9AgqfArGZff5SzKRbPabAdUsrh8Ud79onPw7pEnko6:BiVoiGbFgjbAgqfAKZff5S2RbxdUjUI8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2880 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2880 AcroRd32.exe 2880 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2012 1724 cmd.exe 31 PID 1724 wrote to memory of 2012 1724 cmd.exe 31 PID 1724 wrote to memory of 2012 1724 cmd.exe 31 PID 2012 wrote to memory of 2880 2012 rundll32.exe 33 PID 2012 wrote to memory of 2880 2012 rundll32.exe 33 PID 2012 wrote to memory of 2880 2012 rundll32.exe 33 PID 2012 wrote to memory of 2880 2012 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD575a33a0756c8cc130d16fe6e0fa33851
SHA1556e77f15a8cea2c906ea0d02079e0b965186e4a
SHA25666fb4fc5a1eccbc5a26cd3ce0e74d15bb43b331ca523caaeeacbdf1556cdc24b
SHA51293c6462b605764bed5e8adcc487506536f2e319695636f0655200bbecd1686ef62755cd486674369524d92724993281cd1a1c59a4f9b7d728ed4d3bfcb1a9bd7