Analysis
-
max time kernel
20s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
Krunkify Loader (1.19).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Krunkify Loader (1.19).exe
Resource
win10v2004-20240802-en
General
-
Target
Krunkify Loader (1.19).exe
-
Size
39.1MB
-
MD5
b9f745b1526b29439fdd38ce6b2bc742
-
SHA1
bc4d96ab019f20b1f27f9c42b28335881b12667b
-
SHA256
662aa5533d68b67b9c4a3df2ede43fc3248689364ad91bb7375a6aad469537ac
-
SHA512
59ecbbc8dd57e0967d23dca59a224a114f9e2774b25b8334123434e5244828b2e24372f18c2274693c2005ef0b07b77b3893492409e41884290b89dbf7574ea8
-
SSDEEP
786432:drUx++qTptDALygrfynGsEweceyuTZ3gPEFOuvR1q+6fCvp6LM5F8/TYS+pdGDg2:FHADfst7CyuZ3fr6fCvrDgTzs8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1648 Stub.exe -
Loads dropped DLL 2 IoCs
pid Process 1968 Krunkify Loader (1.19).exe 1648 Stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 chrome.exe 2932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe Token: SeShutdownPrivilege 2932 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe 2932 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1648 1968 Krunkify Loader (1.19).exe 30 PID 1968 wrote to memory of 1648 1968 Krunkify Loader (1.19).exe 30 PID 1968 wrote to memory of 1648 1968 Krunkify Loader (1.19).exe 30 PID 2932 wrote to memory of 2592 2932 chrome.exe 33 PID 2932 wrote to memory of 2592 2932 chrome.exe 33 PID 2932 wrote to memory of 2592 2932 chrome.exe 33 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 2044 2932 chrome.exe 35 PID 2932 wrote to memory of 1512 2932 chrome.exe 36 PID 2932 wrote to memory of 1512 2932 chrome.exe 36 PID 2932 wrote to memory of 1512 2932 chrome.exe 36 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37 PID 2932 wrote to memory of 2896 2932 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Krunkify Loader (1.19).exe"C:\Users\Admin\AppData\Local\Temp\Krunkify Loader (1.19).exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\onefile_1968_133714168575740000\Stub.exe"C:\Users\Admin\AppData\Local\Temp\Krunkify Loader (1.19).exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f49758,0x7fef6f49768,0x7fef6f497782⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1020,i,4808548438984349511,6338668539397024361,131072 /prefetch:22⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1020,i,4808548438984349511,6338668539397024361,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1020,i,4808548438984349511,6338668539397024361,131072 /prefetch:82⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2132 --field-trial-handle=1020,i,4808548438984349511,6338668539397024361,131072 /prefetch:12⤵PID:300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2172 --field-trial-handle=1020,i,4808548438984349511,6338668539397024361,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1448 --field-trial-handle=1020,i,4808548438984349511,6338668539397024361,131072 /prefetch:22⤵PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3224 --field-trial-handle=1020,i,4808548438984349511,6338668539397024361,131072 /prefetch:12⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 --field-trial-handle=1020,i,4808548438984349511,6338668539397024361,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3008
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD5f1dc9eac417df7d6362d5218b053126d
SHA134c80d098ea658f421e265a0c24199408385a947
SHA2567a58fecec3e752159c457742355c4da27849f62cd9cc60fdf9346a2173255839
SHA5126a3b2ee91e8602182691390aa0dbd124caf834e3ace697550b3297369821a9c611577d2fa628ea1de44973cc5a327d1c94142c8fd773ed5d011278281a4f46c1
-
Filesize
5KB
MD5a702fd7bedbf60fb1f4cd542d4825379
SHA10331d8845ca65a06a1e5aebd9b6d6edc1a679445
SHA256972735c92f08d4c4c47398b72507c672c419fe3225e8de8c6ab1384dcec99e0e
SHA5128323e6fd8f2f28e1323078b9a23cb8a93e0534dc7100a36e6c361b220c1f44c0b7dbe51aace50060446d5c3a6212146ca071f637fed503a952ea1e7da2e55d04
-
Filesize
5KB
MD53357ef449dd27828a350b964adbce493
SHA19b662fc068132798add4beba1158ec209230a132
SHA25629a12f02e37c45292923b748c2dc2cb09d5d4b02188249fb12a640cd91beb38e
SHA5124e92c166cda21148010c215b8c98dd44408270f4532cfcb903d77318de33caddabb9246dfb5f6e8fd2aee193c9b1d3381cd788cafc5a6a08f9293c7582d95888
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858