Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 16:11
Behavioral task
behavioral1
Sample
krpt.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
krpt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wps.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
wps.exe
Resource
win10v2004-20241007-en
General
-
Target
krpt.dll
-
Size
1.3MB
-
MD5
8acdc3de7aee7d7d7242d42e7e5254be
-
SHA1
d0be878a474170584ba3cfdfd19b22baa81f19df
-
SHA256
53acfefcda2e6e3f31786a2e2c7fa5bcb83380e284d919f03bfc6d31a6b3b76f
-
SHA512
13f541bda8961d649ec3ec1351413281fe2e340f17bce09a3c7b09a411f0b27fa7d0e5693399032ca725ef598c84096bfcc5d0f5775121fab7b89f323c0c1db0
-
SSDEEP
24576:FrqYkIXkv6WMVqgF7687IMFAO1KlyOQpppppppppppppppppppppp4KVmsdzaA+5:F+YB86Wr/2ImAJy
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 9 3532 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1888 WINWORD.EXE 1888 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1888 WINWORD.EXE 1888 WINWORD.EXE 1888 WINWORD.EXE 1888 WINWORD.EXE 1888 WINWORD.EXE 1888 WINWORD.EXE 1888 WINWORD.EXE 1888 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1220 wrote to memory of 3532 1220 rundll32.exe 83 PID 1220 wrote to memory of 3532 1220 rundll32.exe 83 PID 1220 wrote to memory of 3532 1220 rundll32.exe 83 PID 3532 wrote to memory of 1888 3532 rundll32.exe 84 PID 3532 wrote to memory of 1888 3532 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\krpt.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\krpt.dll,#12⤵
- Blocklisted process makes network request
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\冠状病毒实时更新:中国正在追踪来自湖北的旅行者.doc" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
713KB
MD5c5b98b77810c5619d20b71791b820529
SHA10c9bcc7e92c9557d4f2072e40af0e5e029d92c15
SHA256fb82f32b9ce1d63cc86ab6ee93b9e619056222af181578d2f8ed38ee6474c092
SHA512e6f16c71d3aefff8789c28b1a8abbcb47680dbdced912f50d318a9037c6f56bfe0a48e5cbf879ef24cecff03a5af937f8ec4b25c8230229730f71c38453da2b4
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD5915dbad9f426c6d774a0cd620d0cac41
SHA19b1077c8f7b07414c4fda505becdc8bb601bd7ed
SHA256804ba55381041dd75376831216975237b5057f46697bab1095d8a8973bbddcd0
SHA5128dc1924e21d96ddec0cea80db688e899dd9c19bb745452ef39e755004842d06b397583059bdb9c6ec7d89f141079e7d71b507636c87644051689fb73c2f931c0