Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-10-2024 21:40

General

  • Target

    KRLN/KRNL Remake.exe

  • Size

    506KB

  • MD5

    e827bd09934709f4955b0e7ea4509ae7

  • SHA1

    4c7364758d5891c10fd603cbf104b0e9413ff4b1

  • SHA256

    2ffc609f2556ed208c7aea6e4217c9c1e337e4004c1c0981bf455953d0b8a34e

  • SHA512

    e17d5a319d5e6725297bf95683aad15dd72604c0d70b6bf4a438cb07ac6fec8c5dd42209961f0ebaf14fbd64735569f25092f7df1a50b43bd8c6d121decfa55f

  • SSDEEP

    3072:vfTc9bvGjdh559dJ12QcVXqLRY3pClghBCWyyCzn8sZL3l4gxHC2E+JQLujdX:v8GvL9d2VaLa3pClghtyV8sug5Iu

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KRLN\KRNL Remake.exe
    "C:\Users\Admin\AppData\Local\Temp\KRLN\KRNL Remake.exe"
    1⤵
    • Enumerates connected drives
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3044-0-0x000007FEF5B63000-0x000007FEF5B64000-memory.dmp

    Filesize

    4KB

  • memory/3044-1-0x000000013FBB0000-0x000000013FC34000-memory.dmp

    Filesize

    528KB

  • memory/3044-2-0x00000000022B0000-0x00000000022F2000-memory.dmp

    Filesize

    264KB

  • memory/3044-3-0x000007FEF5B60000-0x000007FEF654C000-memory.dmp

    Filesize

    9.9MB

  • memory/3044-4-0x00000000009F0000-0x00000000009FA000-memory.dmp

    Filesize

    40KB

  • memory/3044-5-0x000007FEF5B60000-0x000007FEF654C000-memory.dmp

    Filesize

    9.9MB

  • memory/3044-6-0x000007FEF5B60000-0x000007FEF654C000-memory.dmp

    Filesize

    9.9MB

  • memory/3044-21-0x00000000269F0000-0x0000000027196000-memory.dmp

    Filesize

    7.6MB

  • memory/3044-22-0x000007FEF5B63000-0x000007FEF5B64000-memory.dmp

    Filesize

    4KB

  • memory/3044-23-0x000007FEF5B60000-0x000007FEF654C000-memory.dmp

    Filesize

    9.9MB

  • memory/3044-24-0x0000000022280000-0x0000000022288000-memory.dmp

    Filesize

    32KB

  • memory/3044-25-0x0000000022290000-0x00000000222A0000-memory.dmp

    Filesize

    64KB

  • memory/3044-26-0x000007FEF5B60000-0x000007FEF654C000-memory.dmp

    Filesize

    9.9MB

  • memory/3044-27-0x000007FEF5B60000-0x000007FEF654C000-memory.dmp

    Filesize

    9.9MB

  • memory/3044-28-0x000007FEF5B60000-0x000007FEF654C000-memory.dmp

    Filesize

    9.9MB