Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-11-2024 11:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/billythegoat356/Kramer/raw/refs/heads/main/examples/obfuscated.py
Resource
win11-20241007-en
General
-
Target
https://github.com/billythegoat356/Kramer/raw/refs/heads/main/examples/obfuscated.py
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 raw.githubusercontent.com 11 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\obfuscated.py:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 4316 msedge.exe 4316 msedge.exe 1612 msedge.exe 1612 msedge.exe 916 msedge.exe 916 msedge.exe 1504 identity_helper.exe 1504 identity_helper.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4316 wrote to memory of 3376 4316 msedge.exe 79 PID 4316 wrote to memory of 3376 4316 msedge.exe 79 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 1756 4316 msedge.exe 81 PID 4316 wrote to memory of 2752 4316 msedge.exe 82 PID 4316 wrote to memory of 2752 4316 msedge.exe 82 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83 PID 4316 wrote to memory of 2188 4316 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/billythegoat356/Kramer/raw/refs/heads/main/examples/obfuscated.py1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8004c3cb8,0x7ff8004c3cc8,0x7ff8004c3cd82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3796 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:12⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,4787618650481622065,14704375173851668301,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7145ec3fa29a4f2df900d1418974538
SHA11368d579635ba1a53d7af0ed89bf0b001f149f9d
SHA256efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59
SHA5125bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91
-
Filesize
152B
MD5d91478312beae099b8ed57e547611ba2
SHA14b927559aedbde267a6193e3e480fb18e75c43d7
SHA256df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043
SHA5124086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\489426b6-08d6-4d5e-937a-73061aa100ed.tmp
Filesize5KB
MD5f59bdbe736cbbaeb306ee474fbe8bdab
SHA16342ab2bbf0b65ba8741ddd35126181c6de9a914
SHA256bb7967ff0530731cfc5ba39ab91c8f7d1b814dd5b1d75a6f1c887d37b0d99dde
SHA512be2431ee54d30ee7d17b2eb00585d5b12e304f863ac51b8b5736702737204e0c6977681a2fd13aa0d0c44b3992282e00282fa4ba6cacf43f00a62d23b1646c8d
-
Filesize
261B
MD52c2e6472d05e3832905f0ad4a04d21c3
SHA1007edbf35759af62a5b847ab09055e7d9b86ffcc
SHA256283d954fa21caa1f3b4aba941b154fab3e626ff27e7b8029f5357872c48cbe03
SHA5128c4ce1ea02da6ffb7e7041c50528da447d087d9ee3c9f4a8c525d2d856cf48e46f5dd9a1fedd23dd047634e719c8886457f7e7240aa3cc36f1a6216e4c00ee37
-
Filesize
5KB
MD559fc1ed413274cff824bc31b5e330c23
SHA16ab927e59876f0ec93b9896eebe02b89a13a7675
SHA256c2e7a7dd2d82b9e1b4dc95e83836a21af63530eb10748cbf64acd4e0eb9f93a1
SHA512552d28ccf820bb0402ea2ac64e72b30b6f401762c27390cf7e99840719ec24966242a72c1cab9a53ba8f72538c9c3359e01adfb51970abf8a329bf8e79e991ed
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD510d8a9cea8e88cf8f75ff998e7461aa8
SHA1552f8c7c7e08d49a3795ace1c32756f0c616f3c5
SHA2565dfd8ea82b03d576f27814435c1eb05f77b6274addeab2d3449eaab9efceb14b
SHA5129063882cd5bf69b0b9a855151926b5a5d759da3d440535956f751728bb7784a45506d83ada35eb518c3d7185ed37d9b665a9e8b1e97c15d6eee528362e5232e9
-
Filesize
131B
MD51a567a496ff6ff83f701427a1abfa424
SHA1f2512d2c88c4b90d63fd7e1d0c396ab1b99d1f5c
SHA25640732432fcdd73383016f4a4a0e633f9acc09020d6dfdf0b4afae5410b21b38c
SHA512f138150a12695c6c316241e9bba5a8d04aef947298979b067243097f9db1a992ca188526f39b2f87b78d40d38aae13352566e219cbf28712d0496a8718f3e0ee