Analysis

  • max time kernel
    420s
  • max time network
    1139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 17:58

General

  • Target

    KrokmouLoader.exe

  • Size

    13.1MB

  • MD5

    8b2d7ca2a01a19f936e317066ae265c9

  • SHA1

    c4975ad6c47aad09956513a5c8d0bc2fe071ab4e

  • SHA256

    084f55dc8a85aa13027f9275f908f399f197c6570018e301eed3072fad966bb0

  • SHA512

    a8c4280d17b81f938a0a36060cfa52bfe8672ab512656d7424d370e13e8d30e1170ac9ca1067823c159042a13c8a128cc5de3a58be4daea1180bc789dd5808ae

  • SSDEEP

    393216:dUWz9Iz3I9sGLyR5No1JOs7yJZ0jJ7ksxGIEAROQ7g0cqm:G4ZmnmN7hjOIdw7f

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KrokmouLoader.exe
    "C:\Users\Admin\AppData\Local\Temp\KrokmouLoader.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Users\Admin\AppData\Local\Temp\NoHitDelay.exe
      "C:\Users\Admin\AppData\Local\Temp\NoHitDelay.exe"
      2⤵
      • Executes dropped EXE
      PID:2360
    • C:\Users\Admin\AppData\Local\Temp\index.exe
      "C:\Users\Admin\AppData\Local\Temp\index.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\NoHitDelay.exe

    Filesize

    33.1MB

    MD5

    01db2bc0b1d5fa2ed8b160fb540af06e

    SHA1

    753f668b3b86a8783a042f7ce447d33c3eb4131b

    SHA256

    2722660a1b453f512c6e70f052d20f71b9a568be5c8a71c756af4d4c95c31c14

    SHA512

    e52ac38f75a69ba5725a79c93fb5a3e95c9162cc5dd441b6d9233c4de8605e37aab2fb93329be1a132565173526dd4704fcca24a31e73a9b1248b034ad15c9fc

  • C:\Users\Admin\AppData\Local\Temp\index.exe

    Filesize

    985KB

    MD5

    073334807ce91c5375594c3faca8ea40

    SHA1

    95c0174e877e8a239415ef257d5efa36554c1b69

    SHA256

    f6a99ac1862054da3d25f1fed47cf7d56feb056a2ed7f9885fbf492007c8cdfa

    SHA512

    18f4c8e4838cfa5dbfae467d4511ad298dcab48baa3efef8f6f10f4d01a65581cb7cd3870f5481d8ff82fb038bf7e1c9f26dc070fed7c310ff1d5cd292935e15

  • memory/1956-25-0x0000000000580000-0x000000000067C000-memory.dmp

    Filesize

    1008KB

  • memory/1956-26-0x0000000005490000-0x0000000005A34000-memory.dmp

    Filesize

    5.6MB

  • memory/1956-27-0x0000000004F80000-0x0000000005012000-memory.dmp

    Filesize

    584KB

  • memory/1956-28-0x0000000004F40000-0x0000000004F4A000-memory.dmp

    Filesize

    40KB

  • memory/1956-29-0x0000000005A40000-0x0000000005C54000-memory.dmp

    Filesize

    2.1MB