Analysis
-
max time kernel
58s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-09-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
KrokmouLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
KrokmouLoader.exe
-
Size
13.1MB
-
MD5
8b2d7ca2a01a19f936e317066ae265c9
-
SHA1
c4975ad6c47aad09956513a5c8d0bc2fe071ab4e
-
SHA256
084f55dc8a85aa13027f9275f908f399f197c6570018e301eed3072fad966bb0
-
SHA512
a8c4280d17b81f938a0a36060cfa52bfe8672ab512656d7424d370e13e8d30e1170ac9ca1067823c159042a13c8a128cc5de3a58be4daea1180bc789dd5808ae
-
SSDEEP
393216:dUWz9Iz3I9sGLyR5No1JOs7yJZ0jJ7ksxGIEAROQ7g0cqm:G4ZmnmN7hjOIdw7f
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/3440-29-0x0000000005DE0000-0x0000000005FF4000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 2888 NoHitDelay.exe 3440 index.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion index.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS index.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer index.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3440 index.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3440 index.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4848 wrote to memory of 2888 4848 KrokmouLoader.exe 78 PID 4848 wrote to memory of 2888 4848 KrokmouLoader.exe 78 PID 4848 wrote to memory of 3440 4848 KrokmouLoader.exe 82 PID 4848 wrote to memory of 3440 4848 KrokmouLoader.exe 82 PID 4848 wrote to memory of 3440 4848 KrokmouLoader.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\KrokmouLoader.exe"C:\Users\Admin\AppData\Local\Temp\KrokmouLoader.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\NoHitDelay.exe"C:\Users\Admin\AppData\Local\Temp\NoHitDelay.exe"2⤵
- Executes dropped EXE
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\index.exe"C:\Users\Admin\AppData\Local\Temp\index.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33.1MB
MD501db2bc0b1d5fa2ed8b160fb540af06e
SHA1753f668b3b86a8783a042f7ce447d33c3eb4131b
SHA2562722660a1b453f512c6e70f052d20f71b9a568be5c8a71c756af4d4c95c31c14
SHA512e52ac38f75a69ba5725a79c93fb5a3e95c9162cc5dd441b6d9233c4de8605e37aab2fb93329be1a132565173526dd4704fcca24a31e73a9b1248b034ad15c9fc
-
Filesize
985KB
MD5073334807ce91c5375594c3faca8ea40
SHA195c0174e877e8a239415ef257d5efa36554c1b69
SHA256f6a99ac1862054da3d25f1fed47cf7d56feb056a2ed7f9885fbf492007c8cdfa
SHA51218f4c8e4838cfa5dbfae467d4511ad298dcab48baa3efef8f6f10f4d01a65581cb7cd3870f5481d8ff82fb038bf7e1c9f26dc070fed7c310ff1d5cd292935e15