Resubmissions

04-08-2024 00:17

240804-ak55pszfmn 7

04-08-2024 00:15

240804-ajxryavcrf 7

Analysis

  • max time kernel
    121s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-08-2024 00:15

General

  • Target

    KRNL-REBORN/krnlss.exe.xml

  • Size

    202B

  • MD5

    0ed4b3831ff5e91dff636145f68aac4c

  • SHA1

    2d1140812945dc1b9e400a88c911803639cb2e49

  • SHA256

    03962ae5a55dfc70e2717771a9a7aa37b956b2c5b4c62e3cff9fe24360250347

  • SHA512

    4039d0272678777ba6fa496baf875050bd4c29352fffd37af8c3c07fb2abeedc54ba04a3dd085b491d848e951ccfcbd67ec7ba50a10ec0c624df45e98c18bf1c

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\krnlss.exe.xml"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2284
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:264
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:264 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d30a4cde62fea2f9271a3f7071bea08

    SHA1

    3116c60334a2ae654ed4fb9c8cce09729a472224

    SHA256

    cfbfbea25d2884ed63570b981be0e6ed462ca400629d3652be9f6ec1a375c97d

    SHA512

    d2a29ca214513b3aad2b53911b41dec4f06460bc9ea9fc6fb8655453d487fa9e78ba2f31a3ec467fe58c8b7d836355bd62c217eb6d375503eeaf012076e29425

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d1da13971e45ec7613db95582503d57

    SHA1

    43b31911a874bb1a50161b75cdde5e2a83462a2a

    SHA256

    1ad30bd71f0d6da26cb2c6a6bd9bc920cfcec3b609daa6df69ddfa2779ef72c7

    SHA512

    ff0e728c862e352678531c28c9d8cef1fe2d6cfd7434581b855a2bef20fa9f98881911a4bb4de0e3edea9988a92d3c4ff2a6631976de4e4fc31726e970f01832

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2be4feca8c8e302ffa5fcfe265764cb

    SHA1

    cdaaf52869ea646a502c291d9ea70d3dfd267863

    SHA256

    eaedf3407acdee1af199c5e26a3f9734c732bfc2aa0a58bd80ce44bccb63ddde

    SHA512

    5f266286b9ff58bd4277509ca2a6775beabfa95192c669049627d6b5f8a248c326fe78de3f8e0963a742e85ad8a085c70842f767c5112dacaaa91ded9c497597

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4bdc648b2f24b7fffb835c3602a21bb

    SHA1

    d64d1288094207e78eace733b1e19ecdb7c4ede4

    SHA256

    b869a96c9dcc6b2d75c9380d4c2fc57c1b639342bed0788ae7d24b382e7fe36a

    SHA512

    5c8a52e8187211a48894e0dfe957b290a582fc3418c0efa48e4a7d656b5a846c8279a604028cd69cac8a05ad22f6465ef2c271ae17911bb27acf0566733862f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b6e0bc4515a6880661a390692d6cb2f

    SHA1

    16996a2168e45f7bbf06320dd4da5fcd82c50098

    SHA256

    38ba1228443019d2900688770af0d5c79e96b1b7d0e20337d367fe3fa0592e8a

    SHA512

    947b18d16c8058ff617e4dff7388a5f59f5044e896a3b175216ea4e529607cb4e548c639acb041e58c0712c89e8f310aebf512abdbd0c4802fc9e3e8e5345352

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    535c2364037eb000bc96fc592abae155

    SHA1

    7c70d48dbee33f5a2e7f7aa0935854f7f2282f84

    SHA256

    181fd53d27376303660f56a55d2db4fb251987a0e4c696b8f7ac83a6531d1e11

    SHA512

    9408da6bd5d0f70eecb65b267c1a9415d857fa81e641fa2555d7e46c205fec5cb33069760b4b08112d8bc3af64ebc2e2d2779edf9bce271943a217337b933a1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6434b96769f23ebf63f31b554a6a26ac

    SHA1

    39dab5f7348279f757d062614201b72f9746ae7a

    SHA256

    597a7cc0e3f58d7a68209fa2752b40a4c914c860bcba38a0ea10ad16476f5b79

    SHA512

    8ae79fd8fd2f0bf26980e33f8e8e53546114bb747461353df7f4ad4b5df91c7126b6c350554d1e512e6506edcfe671792116cbd5e1770faf4a23847812f69ae1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e076f621b29815b682e195f47e2fdff7

    SHA1

    5e2ccd94461895f34db705173c065ea0787566a5

    SHA256

    e67c74d842f948d87f16ed05c7878d5b26f1c55174b1eb3fc49fb15077e7b520

    SHA512

    3a7d4e7346b56e71942f5735d21ee6c4f6b098a1f58f6e67dff579e2bfa5dda020f427ebdc59e158302783cd62ca1be00ddea75306ad94d991338344bfb1ccb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    078f26abcb2cc3bda6b1280e23bbcfed

    SHA1

    f87990d0eb82d79eda4d7b91a12d5ea1ab7b3d6f

    SHA256

    f9b7c9a7bc8c218afd3494f48e005757b676f39205d43961f68a5bde0c571d2f

    SHA512

    360b78ef426e8cdaa0a8175d890825c25391678f8ef7b7f1a30612de80aa76e0fe26c88f5fa47a9409079ad23d07852d93ceea595313afa81ca5dc4b889f60a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66e40d893ea513166da2d2b9be5810cb

    SHA1

    edd3b3b3982fd21ebb01791dc8ceb365654751d5

    SHA256

    c587a72e51e6909a1c27209b51f620a934628b4ee0aea855aae18dce531b5e86

    SHA512

    fe55f5240be8c78428ff715aad983337e3944d3a0f19583dc60112f2524740ba8dd7569dc3b340425bf6914914ffefbb2a255ea85ccadca1c09c433aa7e545d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2043f099c6443fc1754c1ce2178bf87f

    SHA1

    894fb4e8fb33332550cf046f022cae724a57fb28

    SHA256

    439cfec2b426ebf58922d7ce0c609cabe21aa42628e84bde4a707f388ff87240

    SHA512

    0d5b9d92e4c7341d29ed7eb82f2e2a4098c8ff7760abb2787650e9c142289abae20a3ea6dab9822929b49af0feb7fd5240cf4abb8e709acf17c7577102191ad6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cccdea551069e92aa9e6da868ba9c000

    SHA1

    24254f58a4c65819a1a9aaaed261e9c18626fe84

    SHA256

    bf4f6eda22c43d6a2f2c0ef9ea2fb07e34ebdf731d746ad294533c12e7b89164

    SHA512

    5ba0f16c217bd750b60a96546b0bea61c820233d362078b444ca030913657d5863bcce69dd9b9e85fa424f974a6f9382b100109e9061e206caaf94e83eac5118

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f41bbaaf893bab9ea262f5b597ef5cad

    SHA1

    86d25c6a0f9bd8870e5ac8e7a3ccc8b060da5101

    SHA256

    b3b84ad21cec2ef248eee9181999922ec2a9bab083bf6fc7257b20252c4497c9

    SHA512

    0806e8f111e5eee3d9bcf5c96b14a105d924e83bab1865e4b8f0517971c75b884e0d0a600b9b59d09b1e18cd7ed400f1c38687943fc40d96d0b3daa26041f4d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3ab191ed1f929044e84c0dd92fe3c45

    SHA1

    026ba24c855bdfdc9af49cfbce596cb25697c018

    SHA256

    72e908eaa7981d1c72cf770dce1f0287e1b81fe26de95c3605c2521f364c6e37

    SHA512

    0bc69138e172be4d3ea5278cfbe24def28675ab04e41edf419c697744f81b9e354ccb7957511f24da12d120d8a8b37e09749dda7c6c40e97f677c77711084578

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00f3331d57d092373784d51a0e7cc8d1

    SHA1

    57361088fa17a65d8de55499baa3324180430bda

    SHA256

    ad784e779fcc18acda3d9f97b69625708b606b096781cf61f05e20a787acbb6c

    SHA512

    8f434f86be2fa3f72b3eeb92253d74fff6598148ff861255568bc7bbc62f1d5f88441e3015d0f530b00ae94b2fa5bea543bb364437ba2b775f58719473675959

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7179a8f3826fe8525ef064fa156c8402

    SHA1

    999c9d1e425f38de8124ab851e50cc6cc03821d0

    SHA256

    47ba70ff428d0c328e44faad00ffa358f23f870c725de1d7a42400d5e293f6ff

    SHA512

    43887cd466bbfdf4d3fba9e7246e22103722aad199411c85bcd17b6b41bec4177eb8cb7a0eb92d090891ce1765288de614e375f98d5a1dc4c2b39520059d7e1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    071ee4c3f60d0a862b8811e7ee7d8314

    SHA1

    84a8c46438447694a557a68a563e926adf42144e

    SHA256

    bb9ecb7ad7cba3e324ed80ee689ffe6c7d9c86eef8cc228baf670e0846d18183

    SHA512

    576fdb136279d79164d8d5e97d70e4b0acdab38264edc4c737ed24623588e9ff04fa830ffaad1e9db13babb1ecd032f3a4c02214ba0259d59eee5d43e1ae8c90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5b374b083594d7b41de06d8b9c9b74f

    SHA1

    d9104c79b8c8c7ef08b30c30a97b26b5027fbf43

    SHA256

    e68c1d28006c17e0d8148ac9f4d097e037e34ae51fb189b2320206eeaf4f31b3

    SHA512

    2f071b51c5ca1dd4f80380377c5b020a8c988cda1f4a726a94102c602db548f6cc5402c5f2f589459dad53370ee19a5009385dec3b57bdf629505a9e226a6cfc

  • C:\Users\Admin\AppData\Local\Temp\CabF875.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF8E6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b