Overview
overview
7Static
static
3KRNL-REBORN.zip
windows7-x64
1KRNL-REBORN.zip
windows10-2004-x64
1KRNL-REBOR....3.dll
windows7-x64
1KRNL-REBOR....3.dll
windows10-2004-x64
1KRNL-REBORN/README.md
windows7-x64
3KRNL-REBORN/README.md
windows10-2004-x64
3KRNL-REBOR...ET.dll
windows7-x64
1KRNL-REBOR...ET.dll
windows10-2004-x64
1KRNL-REBOR...ec.lnk
windows7-x64
3KRNL-REBOR...ec.lnk
windows10-2004-x64
3KRNL-REBOR...rn.dll
windows7-x64
3KRNL-REBOR...rn.dll
windows10-2004-x64
3KRNL-REBOR...xe.xml
windows7-x64
3KRNL-REBOR...xe.xml
windows10-2004-x64
1KRNL-REBOR...02.exe
windows7-x64
7KRNL-REBOR...02.exe
windows10-2004-x64
7main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3KRNL-REBOR...ce.lnk
windows7-x64
3KRNL-REBOR...ce.lnk
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/08/2024, 19:47
Behavioral task
behavioral1
Sample
KRNL-REBORN.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
KRNL-REBORN.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
KRNL-REBORN/README.md
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
KRNL-REBORN/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
KRNL-REBORN/autoexec.lnk
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
KRNL-REBORN/autoexec.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
KRNL-REBORN/krnl-reborn.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
KRNL-REBORN/krnl-reborn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
KRNL-REBORN/krnlss.exe.xml
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
KRNL-REBORN/krnlss.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
KRNL-REBORN/krnlss_v102.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
KRNL-REBORN/krnlss_v102.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
main.pyc
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
main.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
KRNL-REBORN/workspace.lnk
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
KRNL-REBORN/workspace.lnk
Resource
win10v2004-20240802-en
General
-
Target
KRNL-REBORN/README.md
-
Size
305B
-
MD5
8d250ce6aa236fecbc223ad289909ade
-
SHA1
f2ae9ba834da647eece945abe37885ce937d48b6
-
SHA256
2d8ecef01e25360ebe21f5dee53a017797c5e6219e5fd041027332efb690f52f
-
SHA512
8a346ec6f8ce14e0ce694209fed174af41f80347f8bd3c1bdb5f4e4edb1ba00bed776a9d1690bebe3776332efcf9c215de0d03c6b471e5403836e3d463214e10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\md_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\.md rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2624 AcroRd32.exe 2624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2320 2864 cmd.exe 31 PID 2864 wrote to memory of 2320 2864 cmd.exe 31 PID 2864 wrote to memory of 2320 2864 cmd.exe 31 PID 2320 wrote to memory of 2624 2320 rundll32.exe 32 PID 2320 wrote to memory of 2624 2320 rundll32.exe 32 PID 2320 wrote to memory of 2624 2320 rundll32.exe 32 PID 2320 wrote to memory of 2624 2320 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52d476bb93209d511eb0a938a818e6765
SHA15026dd5849fa47d2a94eac05f189a0808e1e6b06
SHA256beef6e2a6e59fa8e065efd6fcd86bb5a9487a98195414c8bc34c4e557b6ef351
SHA5127146a903b5925ac0f8a34c3df0d598e85a078a3b3a1843b0f192ef0e71de53d54738aff36fbdc1d0da384c97ba257cef9b07650b82d35ec2e8ce3bd758e474c1