Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 01:44
Static task
static1
Behavioral task
behavioral1
Sample
a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
kruxx.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
kruxx.exe
Resource
win10v2004-20241007-en
General
-
Target
a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0.exe
-
Size
248KB
-
MD5
60268126a7a5c0a03358e7acb155753d
-
SHA1
6aa7f8495a0498d437c0a1255d31e1f85a4045c6
-
SHA256
a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0
-
SHA512
51c376341b15a3355d5e9b427b15d6552a332d2b5fc5934e5705db55d1106b77898396291c4b56ca05c3e00e0479bcda61a6dd354e19d855717fa22a3cc56979
-
SSDEEP
6144:HNeZmabIvllTu8EWvbk9Xi7asfYqGcWsL6Rq8:HNla0vllTuWjSiWaWsLiq8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3948 kruxx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1868 3948 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kruxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3948 4960 a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0.exe 83 PID 4960 wrote to memory of 3948 4960 a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0.exe 83 PID 4960 wrote to memory of 3948 4960 a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0.exe 83 PID 3948 wrote to memory of 3588 3948 kruxx.exe 84 PID 3948 wrote to memory of 3588 3948 kruxx.exe 84 PID 3948 wrote to memory of 3588 3948 kruxx.exe 84 PID 3948 wrote to memory of 3588 3948 kruxx.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0.exe"C:\Users\Admin\AppData\Local\Temp\a9443eaa7d2d6dcb3c7fc77200c340bdfb7acba3f77aecbb5d07c0f50b5e1ee0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\kruxx.exeC:\Users\Admin\AppData\Local\Temp\kruxx.exe C:\Users\Admin\AppData\Local\Temp\ibrjgqmyl2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\kruxx.exeC:\Users\Admin\AppData\Local\Temp\kruxx.exe C:\Users\Admin\AppData\Local\Temp\ibrjgqmyl3⤵PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 5923⤵
- Program crash
PID:1868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3948 -ip 39481⤵PID:2888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD545ed546858332c77218e12066a6029fa
SHA10858494aa6e52959811e57e8398614cc09c62153
SHA256810fdd38959fcf9f3dba6ae58163cffb80078085d5d647a6929211d90cb7c873
SHA512003533ccca626dadfa4c4486effac47eca3150e93aad8123c1ffb5c39363e5048238d42c9b4c910c1c588a21393473d76e5cb6ab420a8c0d7bf3e005ca2fcd9d
-
Filesize
78KB
MD572cc5689ff61af5b6ce2ad9ab8e87695
SHA1b30d786ff2e5ad9e916f188ecb463392e8ba75f6
SHA25616e225b10cd5bc64956c75ac0fa201a37127badec00a33d9b4d5ad0b76e26198
SHA512b3974b38475f39def30d4f9cadd4e6c3387f4296a75352bd88cc1f98f1adf9959eec06b1bf9d9f3dc4c0c14baf758ba9fcf8705ce3256a6487afb50afa26bf94
-
Filesize
184KB
MD5c0d1a464617230b6629ebb9b91cd1505
SHA1afa65713857e56caffa5fad7efb37df0f7596bbf
SHA25658202640a0e3fe1c7bbf9ff4d3713bab99e4264ca358a369f4d8051a7a2adc17
SHA5120641c5a98239e7ed1ccbe0d1cbdb5de390374f6752de350a9db8a0769119566db98e00912e7bd1fabb318859662f98f6def95c301a37ece1bf2b8fa4ea017e03