Overview
overview
7Static
static
3KRNL-REBORN (1).zip
windows7-x64
1KRNL-REBORN (1).zip
windows10-2004-x64
1KRNL-REBOR....3.dll
windows7-x64
1KRNL-REBOR....3.dll
windows10-2004-x64
1KRNL-REBORN/README.md
windows7-x64
3KRNL-REBORN/README.md
windows10-2004-x64
3KRNL-REBOR...ET.dll
windows7-x64
1KRNL-REBOR...ET.dll
windows10-2004-x64
1KRNL-REBOR...ec.lnk
windows7-x64
3KRNL-REBOR...ec.lnk
windows10-2004-x64
3KRNL-REBOR...rn.dll
windows7-x64
3KRNL-REBOR...rn.dll
windows10-2004-x64
3KRNL-REBOR...xe.xml
windows7-x64
3KRNL-REBOR...xe.xml
windows10-2004-x64
1KRNL-REBOR...02.exe
windows7-x64
7KRNL-REBOR...02.exe
windows10-2004-x64
7main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3KRNL-REBOR...ce.lnk
windows7-x64
3KRNL-REBOR...ce.lnk
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
04-08-2024 00:15
Behavioral task
behavioral1
Sample
KRNL-REBORN (1).zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
KRNL-REBORN (1).zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
KRNL-REBORN/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
KRNL-REBORN/README.md
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
KRNL-REBORN/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
KRNL-REBORN/ScintillaNET.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
KRNL-REBORN/autoexec.lnk
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
KRNL-REBORN/autoexec.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
KRNL-REBORN/krnl-reborn.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
KRNL-REBORN/krnl-reborn.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
KRNL-REBORN/krnlss.exe.xml
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
KRNL-REBORN/krnlss.exe.xml
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
KRNL-REBORN/krnlss_v102.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
KRNL-REBORN/krnlss_v102.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
main.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
KRNL-REBORN/workspace.lnk
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
KRNL-REBORN/workspace.lnk
Resource
win10v2004-20240802-en
General
-
Target
KRNL-REBORN/README.md
-
Size
305B
-
MD5
8d250ce6aa236fecbc223ad289909ade
-
SHA1
f2ae9ba834da647eece945abe37885ce937d48b6
-
SHA256
2d8ecef01e25360ebe21f5dee53a017797c5e6219e5fd041027332efb690f52f
-
SHA512
8a346ec6f8ce14e0ce694209fed174af41f80347f8bd3c1bdb5f4e4edb1ba00bed776a9d1690bebe3776332efcf9c215de0d03c6b471e5403836e3d463214e10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.md rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\md_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2840 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid Process 2840 AcroRd32.exe 2840 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid Process procid_target PID 2136 wrote to memory of 3016 2136 cmd.exe 31 PID 2136 wrote to memory of 3016 2136 cmd.exe 31 PID 2136 wrote to memory of 3016 2136 cmd.exe 31 PID 3016 wrote to memory of 2840 3016 rundll32.exe 32 PID 3016 wrote to memory of 2840 3016 rundll32.exe 32 PID 3016 wrote to memory of 2840 3016 rundll32.exe 32 PID 3016 wrote to memory of 2840 3016 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\KRNL-REBORN\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55bc4d6418ea336f66785b70e7a0f2964
SHA1b4a65c7a92dae236a4dc48b414ff8218d13b0a7d
SHA25669ce3caf4564e186cb559126f92e4f6bc8d8d8431a4c03b1aba6b15387b7b606
SHA5121453ff3f24a199f17ce5ed7fe7d0e2af089a26b59502fa7fd2d85ab64c7663b386ab23028a84f418aacaab11668536562fa59f49f84b0d506c392b2063b5e57c