Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
05/08/2024, 07:58
240805-jttygazhqm 4Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/08/2024, 07:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1269895579794800772/1269900254053007425/Krampus_Executor.rar?ex=66b1be46&is=66b06cc6&hm=ffbc0d3e60df6b2cc7d69d4643a3b02930f17d5ad1e1b86280f1e067c7943149&
Resource
win11-20240802-en
General
-
Target
https://cdn.discordapp.com/attachments/1269895579794800772/1269900254053007425/Krampus_Executor.rar?ex=66b1be46&is=66b06cc6&hm=ffbc0d3e60df6b2cc7d69d4643a3b02930f17d5ad1e1b86280f1e067c7943149&
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133673183163241175" chrome.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-4272559161-3282441186-401869126-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Krampus Executor.rar:Zone.Identifier chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2028 vlc.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 1000 chrome.exe 1000 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 4884 OpenWith.exe 1556 OpenWith.exe 2028 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe Token: SeShutdownPrivilege 4796 chrome.exe Token: SeCreatePagefilePrivilege 4796 chrome.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe 2028 vlc.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 4884 OpenWith.exe 2928 OpenWith.exe 2928 OpenWith.exe 2928 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 1556 OpenWith.exe 4928 AcroRd32.exe 4928 AcroRd32.exe 4928 AcroRd32.exe 4928 AcroRd32.exe 2028 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4160 4796 chrome.exe 80 PID 4796 wrote to memory of 4160 4796 chrome.exe 80 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 1880 4796 chrome.exe 81 PID 4796 wrote to memory of 4540 4796 chrome.exe 82 PID 4796 wrote to memory of 4540 4796 chrome.exe 82 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83 PID 4796 wrote to memory of 2736 4796 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1269895579794800772/1269900254053007425/Krampus_Executor.rar?ex=66b1be46&is=66b06cc6&hm=ffbc0d3e60df6b2cc7d69d4643a3b02930f17d5ad1e1b86280f1e067c7943149&1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce81ecc40,0x7ffce81ecc4c,0x7ffce81ecc582⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1952 /prefetch:22⤵PID:1880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1756,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1988 /prefetch:32⤵PID:4540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2184 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4688,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4760 /prefetch:82⤵
- NTFS ADS
PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5204,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5396,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4512,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4864,i,11210237333446836669,12296255026640512231,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3028
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4884
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5076
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2928
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Krampus Executor.rar"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4928 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
PID:3772 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=816FF3E37687F276303E34BA0D980C27 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=42BA866A890BD36FE52064EF37AE6AE2 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=42BA866A890BD36FE52064EF37AE6AE2 --renderer-client-id=2 --mojo-platform-channel-handle=1780 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F4895414D594ABE309E20B5CDFA853DF --mojo-platform-channel-handle=1772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3288
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=21CF562C95E6E0B667195B2EF4B4606D --mojo-platform-channel-handle=1816 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:8
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3721D7B6C7A252B955AC347D2C20B249 --mojo-platform-channel-handle=2508 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1536
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:732
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\Krampus Executor.rar"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
216B
MD50dd8a6917d200b653eff4ac75a01f4d1
SHA19caf255c42e38bbb29744513926c16ad74945a9b
SHA256314862c1ac7d66454946739911787918e46333e50ddefb84eb0c497dc939f56c
SHA512518374722c24b75080b393dccd9bf837faa0a8e05f439f95ef549c4c413d9ec3b93a220d3947b508155024460b8c8bf79be0bac6edb9cffb95bd586e2c76b323
-
Filesize
1KB
MD5c16356af0f3ce6a6026c480eb2a69c90
SHA18db8ecdbb556903b58600c1f56e30d680b9d7f71
SHA256c43311029ab49a89979eb1776520c1f8ccdee661b0b5ce2e9e8d1ab1c3e05dde
SHA51217c0cedef9bd50fb6e7293b26e0c88ae74bc281455b853f5b8854ad451e55d2ea57c85ab02dc5f3b220b76ba752398b62de9ad7e2f04fa3d46eb379cc8d2e1ff
-
Filesize
2KB
MD53fba6989fac46135ba4c13babd43275e
SHA154f5389eba8b31f45bf094644e036e1073b3f529
SHA256c1b2557d4f7fa8103f85e2e1f6295ed43c1c6e82ebc9f7986b772a419823b1e8
SHA51211e7a9787065b1921f89e103b82f944ca7b77856a1ade6cc5e926eea5a6051d28738eb1bc8e63ce9bcb9fb0db8a19c80c5c82d8522ab37fc055fdef921c6e248
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5ea32797e80aef145b2c22c9828b05065
SHA157c6ca09e93e3ced755fdfb699084d94c3e42644
SHA256eb8d743e4213eabe5c415743c12ab85afa8fb7371ce4397cd90cabab9feeb191
SHA5123c7dbd4312a7150c3f90a3d4a01daa4dde5626e82d1d7faf1a8ee44dde65784b5851bedcd7ca1d5ed2c0d523ece7a3c5392067f151ec110e4747b7fcd942d7d4
-
Filesize
356B
MD5e229ab688f4cf9edece16c20a1c18c94
SHA12465100971f4ca63475a3b0b4dae11d09971433a
SHA256783f0f3a3442d3d35fb162fb9f17a0ae16a27a7c89db492f02cf9077f772464d
SHA512722d9dda63ca20a8dfc978a7880fd4dc9ada36fa694ffb8f64bcd7c8d9dbebc95644d735c8840e2a261a9113e634063ceca4b2689ae4452613dcd060f1ce5b3e
-
Filesize
356B
MD564fa0019a6fbee49ed22cefcbf616f70
SHA13e488277677e8a03cd27d3c6ce606d55dd4e29f1
SHA25691649a7483ae11265468bf4ba4fe0a1ab7c66ab3a976729346900c5692e4af34
SHA5127504c3d589baad4a4d3ce24570cd6486a1a22efcd761df6b66d85dbec1bb3c60eb15a07927b5bae43bb62c551a853798a3836b5d2156549df27a728a60d5008a
-
Filesize
9KB
MD5bb8b873fd7fbf9768ea4f17d64bf3e5e
SHA15be53e7acf0dac31d66113d7a40954b74b0ea89b
SHA2562f18a368402d621265fcf24ca54595e70ce8bcff2ccb0350fdfadf1ee32e9e23
SHA512e22415a7f55327768f58084b771a57f5acfe99f268c95f8b7ea360e635722ecbd969f296d2ab63f13fc088d3b8f6efa59992aa0629ea0f666ce9bd0b411623fe
-
Filesize
9KB
MD5daea8c7100a5e719ace6294d5ea5b853
SHA1e66df19e9cb7a82335360b150d1bda577a70c1e9
SHA2562f806d3405ce6cdd434c6b9c2458ccc2bcd4214590d895d8dd6381ac7f2754ac
SHA5124d43336f66eb016088c8ba54467cab35a71f52625bbd698e1b0c03febc5b1d21da83ce64ea89daacd98f717c6355feba0be03aa4100ec445a87b49e36fa3c4d9
-
Filesize
9KB
MD50228e505750d01f9d57964be69aa3af0
SHA19f6d5e5718881e11f112f2c403e6f0bee496083b
SHA25698cca7adb59aad9c4f7ad0453227d663507d62f5401ab848c922de0f5d77fe1a
SHA512e53d24fe023caf571fd9cfcd2682cec70ae925dfbf60ca0bdd35eb0166687beb42ca9aba1e9f8ef133d9736ead9bb393c74c708a5e833d8055a119375a19369e
-
Filesize
8KB
MD5957f3f99ddfa57eba70af8755d4b96ff
SHA1fcfc7ecff34e5983ce9339502504c68487cdaa19
SHA2562d26ce9afe6fba68bc33b5b0e13e35162bdb0c79e3b480b560d56b34aa3494ad
SHA5123307ce1064b69ed273e52c6643bddd5c4acd9ec5e9bdebe04fed58f4764f8e5efc99142ff38a9d6ee894148f54e5a3a7fd43c09b26194dcd3e74176c065a8e17
-
Filesize
8KB
MD5f62caf2699e8dd3e19f289d37a4eda91
SHA1b4d8eee3f467887964c4c41a6dfba576991b4b90
SHA256584f048e1e004d4855565dec70fcbc1b15a97652a5430e7e8137e43062ee25f1
SHA51215f4c754a5c274c9f74f59011bdd5ba75c18751a348202abdef7e89db109a563c65ec2684afa575838fdeb08252a0ae9083fb7bef2c3460f3b31a2b6e7b972fa
-
Filesize
8KB
MD518e0d64f026bb92d93319e925e70310f
SHA1d8d2a11a5d8f91a04951e3bf17d359edd9f52f51
SHA2567d29ec6b42a12b6ced8e29f36a6b342bd134adc24a870e6e4c091ee5ba775fe1
SHA5125b14b08107cd0763625433c23f9080ef502c2768246b42141246abc2f8d25adbaccaee580f25134e0f0b6b4f08bbf17a47eeea29f24b0f25028e03cf2d4b650d
-
Filesize
9KB
MD5a98a87fcc1942ca8b681ab48f37cb0bf
SHA18952f433e8cfc3838bef60148f9525a46cee6919
SHA2566fa52857abe5b3cd2e98d73368509853f50413c8a634eb9b603eda3e9cacd3f0
SHA5126e1e1dd89b739db831788e5b3fa69856228fa0d86ab3f9b317cdaff5918685cc002d6e55b69a8c9e1d4a231f673d2c7670bd9c4ca90ce23ac76cb9aeed071dd0
-
Filesize
9KB
MD5242919bd097fcef786081b2df015a295
SHA1a7f37b8fefbf72d0262c59433ff285213523e147
SHA2566dba0f2242d1a2ec7cf6ce2f2e21baa47dabcf390900272a906c0209d449ed1d
SHA512b21e1142f80364fd0cbb91166e70b5f37de5c2070cca09d78e1bb7364e6cdb795bd523fddac319c7a14b7163c712564b219f6a6d6506452c07397c50fcdf1a13
-
Filesize
100KB
MD54816fc58eae1111ff4efa83c7f83fb5e
SHA1726b93c499ae2f4a802ad66c30bbe65c9050f870
SHA256c46624e6df80b4ca2ba2231b23c8eaeccb14c77bdec80ad473d3f5ca54864149
SHA512ef422bc0c027801775b3d5487192d6b0f9305ff44f4db3103538985105e011016c1f2331ab23e25d3702454a2e868f7d045262226286da7cc314f1df491246bf
-
Filesize
100KB
MD5d154cb8a8a0966f0452fd5a27122ce25
SHA14328aba50253a433a3dfb86cbb1d47083a216481
SHA2560b6724823c4438acdf0090e4570bbe52f9b1d658139e2d1ba1a41ddba2bbdf98
SHA51270f6fad185c23c427d3e1019abfffabb144e1b57ef4a8ce7635782eb40b4e065d28f881f7b7ad8dfd906b4a1c3b7eca05cebe2bc8d16aa131acf2f64d8cd9d65
-
Filesize
14KB
MD5dea73bd08e66c63250f8353098b1e128
SHA132675f48c3f434cbaeedd515005f8f2c250e2598
SHA256b33b64a2af55f283a1a6d9392c1a479a775c91afe7980f3508c9edc72b88b753
SHA512c111659412122d0f54a3dd9c898f8a416f9da12b0e060be1decc70eae72817748993f4a633e569d787e3c81854697d8fbde475c9a8505d020a52029687bef6a4
-
Filesize
3.6MB
MD5899f629ed7aa02d370acb410f4a63b08
SHA1c54150e944935a6a4fbb42b3f44e59658a3840ec
SHA256b1330b1281831a2079bd908c06afc8e2aa50fa271e5301c3f35b78707348bf99
SHA512343d2a4abc22856517e4f614233a0f1361533b977664095ae501eef7c9dc9ec0c0e09eb52e21f64098420bd70ea590522f80095d40294c774b0023d53cfabf99
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98