Analysis
-
max time kernel
424s -
max time network
426s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-08-2024 05:53
Behavioral task
behavioral1
Sample
Krampus.rar
Resource
win11-20240802-en
windows11-21h2-x64
3 signatures
600 seconds
Behavioral task
behavioral2
Sample
Krampus/b5uEJHZB6Rl.exe
Resource
win11-20240802-en
windows11-21h2-x64
15 signatures
600 seconds
Behavioral task
behavioral3
Sample
Krampus/krampusexec-65cafadfc556c.txt
Resource
win11-20240802-en
windows11-21h2-x64
3 signatures
600 seconds
General
-
Target
Krampus/krampusexec-65cafadfc556c.txt
-
Size
398B
-
MD5
a1a8eeadd309b1167d848222712ad8fe
-
SHA1
70267e1f57a5c60919ca8014a160b0815f771707
-
SHA256
e78865cb4a3c803ff4d54491e6f38505bfcb13450b5ec053f09e07bc77a73ce5
-
SHA512
310833ec3d56979bfcabc5b41963671df0815ae2efd1dff9983e97246810e795a2938dbeb2793a15ffd6a35255564cd4adbda97dd3e36d7ecf30b61b558d2475
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2904 wrote to memory of 4496 2904 cmd.exe 81 PID 2904 wrote to memory of 4496 2904 cmd.exe 81
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Krampus\krampusexec-65cafadfc556c.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Krampus\krampusexec-65cafadfc556c.txt2⤵PID:4496
-