Analysis
-
max time kernel
420s -
max time network
1139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
KrokmouLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
KrokmouLoader.exe
-
Size
13.1MB
-
MD5
8b2d7ca2a01a19f936e317066ae265c9
-
SHA1
c4975ad6c47aad09956513a5c8d0bc2fe071ab4e
-
SHA256
084f55dc8a85aa13027f9275f908f399f197c6570018e301eed3072fad966bb0
-
SHA512
a8c4280d17b81f938a0a36060cfa52bfe8672ab512656d7424d370e13e8d30e1170ac9ca1067823c159042a13c8a128cc5de3a58be4daea1180bc789dd5808ae
-
SSDEEP
393216:dUWz9Iz3I9sGLyR5No1JOs7yJZ0jJ7ksxGIEAROQ7g0cqm:G4ZmnmN7hjOIdw7f
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/1956-29-0x0000000005A40000-0x0000000005C54000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation KrokmouLoader.exe -
Executes dropped EXE 2 IoCs
pid Process 2360 NoHitDelay.exe 1956 index.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer index.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion index.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS index.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4256 wrote to memory of 2360 4256 KrokmouLoader.exe 85 PID 4256 wrote to memory of 2360 4256 KrokmouLoader.exe 85 PID 4256 wrote to memory of 1956 4256 KrokmouLoader.exe 89 PID 4256 wrote to memory of 1956 4256 KrokmouLoader.exe 89 PID 4256 wrote to memory of 1956 4256 KrokmouLoader.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\KrokmouLoader.exe"C:\Users\Admin\AppData\Local\Temp\KrokmouLoader.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\NoHitDelay.exe"C:\Users\Admin\AppData\Local\Temp\NoHitDelay.exe"2⤵
- Executes dropped EXE
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\index.exe"C:\Users\Admin\AppData\Local\Temp\index.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33.1MB
MD501db2bc0b1d5fa2ed8b160fb540af06e
SHA1753f668b3b86a8783a042f7ce447d33c3eb4131b
SHA2562722660a1b453f512c6e70f052d20f71b9a568be5c8a71c756af4d4c95c31c14
SHA512e52ac38f75a69ba5725a79c93fb5a3e95c9162cc5dd441b6d9233c4de8605e37aab2fb93329be1a132565173526dd4704fcca24a31e73a9b1248b034ad15c9fc
-
Filesize
985KB
MD5073334807ce91c5375594c3faca8ea40
SHA195c0174e877e8a239415ef257d5efa36554c1b69
SHA256f6a99ac1862054da3d25f1fed47cf7d56feb056a2ed7f9885fbf492007c8cdfa
SHA51218f4c8e4838cfa5dbfae467d4511ad298dcab48baa3efef8f6f10f4d01a65581cb7cd3870f5481d8ff82fb038bf7e1c9f26dc070fed7c310ff1d5cd292935e15