File name:

Kraken.exe

Full analysis: https://app.any.run/tasks/a2c24364-10df-484a-a8d5-630839febad3
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: September 27, 2020, 21:53:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
ransomware
kraken
evasion
trojan
rat
azorult
stealer
fareit
pony
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

6AC062D21F08F139D9F3D1E335E72E22

SHA1:

9E967A759E894A83C4B693E81C031D7214A8E699

SHA256:

564154A2E3647318CA40A5FFA68D06B1BD40B606CAE1D15985E3D15097B512CD

SSDEEP:

1536:0bPX/gJxDFgu02gM+LXbtQ5IxWwbglROAnbFmYVKCKclF:0cxz1gxXSNwbYcYVKhYF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Kraken Ransomware was detected

      • Kraken.exe (PID: 2444)
    • Known privilege escalation attack

      • Kraken.exe (PID: 2444)
    • Changes the autorun value in the registry

      • Kraken.exe (PID: 2444)
    • Changes settings of System certificates

      • krakentemp0000.exe (PID: 2172)
      • cscript.exe (PID: 1400)
    • Application was dropped or rewritten from another process

      • krakentemp0000.exe (PID: 2172)
      • Roblox.Builders.Club.7.11.cod.keygen.by.Inferno.exe (PID: 3412)
      • keygen-step-1.exe (PID: 3756)
      • intro.exe (PID: 3208)
      • keygen-step-3.exe (PID: 956)
      • keygen-pr.exe (PID: 1708)
      • key.exe (PID: 3852)
      • Setup.exe (PID: 2236)
      • key.exe (PID: 2100)
      • keygen-step-4.exe (PID: 1956)
      • Setup.exe (PID: 668)
      • 3.exe (PID: 316)
      • Roblox.Builders.Club.7.11.cod.keygen.by.Inferno.exe (PID: 2344)
      • intro.exe (PID: 1504)
      • keygen-step-1.exe (PID: 2568)
      • keygen-pr.exe (PID: 3128)
      • keygen-step-3.exe (PID: 2180)
      • keygen-step-4.exe (PID: 4092)
      • key.exe (PID: 2308)
      • Setup.exe (PID: 3964)
      • 3.exe (PID: 2892)
      • Setup.exe (PID: 2396)
      • key.exe (PID: 3604)
      • emfmgfeho.exe (PID: 2984)
      • 002.exe (PID: 2924)
      • Loader_3.exe (PID: 1548)
      • jgjg_pytopm.exe (PID: 3280)
      • Loader_3.exe (PID: 3492)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2704)
      • cmd.exe (PID: 2876)
      • cmd.exe (PID: 2920)
    • Stealing of credential data

      • keygen-step-3.exe (PID: 956)
      • 3.exe (PID: 316)
      • keygen-step-3.exe (PID: 2180)
    • Connects to CnC server

      • keygen-step-1.exe (PID: 3756)
      • keygen-step-3.exe (PID: 956)
      • key.exe (PID: 3852)
      • keygen-step-1.exe (PID: 2568)
      • keygen-step-3.exe (PID: 2180)
      • 002.exe (PID: 2924)
    • AZORULT was detected

      • keygen-step-1.exe (PID: 3756)
      • keygen-step-1.exe (PID: 2568)
    • Actions looks like stealing of personal data

      • keygen-step-4.exe (PID: 1956)
      • 3.exe (PID: 316)
      • key.exe (PID: 3852)
      • keygen-step-4.exe (PID: 4092)
      • 002.exe (PID: 2924)
      • key.exe (PID: 2308)
    • Loads dropped or rewritten executable

      • Setup.exe (PID: 668)
      • Setup.exe (PID: 2396)
    • Detected Pony/Fareit Trojan

      • key.exe (PID: 3852)
    • PONY was detected

      • key.exe (PID: 3852)
    • Downloads executable files from the Internet

      • Loader_3.exe (PID: 3492)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Kraken.exe (PID: 2444)
      • WinRAR.exe (PID: 3608)
      • Roblox.Builders.Club.7.11.cod.keygen.by.Inferno.exe (PID: 3412)
      • keygen-step-4.exe (PID: 1956)
      • keygen-pr.exe (PID: 1708)
      • Setup.exe (PID: 668)
      • Roblox.Builders.Club.7.11.cod.keygen.by.Inferno.exe (PID: 2344)
      • keygen-pr.exe (PID: 3128)
      • keygen-step-4.exe (PID: 4092)
      • Setup.exe (PID: 2396)
      • Loader_3.exe (PID: 3492)
      • jgjg_pytopm.exe (PID: 3280)
      • Loader_3.exe (PID: 1548)
    • Modifies the open verb of a shell class

      • Kraken.exe (PID: 2444)
    • Checks for external IP

      • krakentemp0000.exe (PID: 2172)
      • Loader_3.exe (PID: 3492)
    • Starts CMD.EXE for commands execution

      • krakentemp0000.exe (PID: 2172)
      • Roblox.Builders.Club.7.11.cod.keygen.by.Inferno.exe (PID: 3412)
      • keygen-step-3.exe (PID: 956)
      • 3.exe (PID: 316)
      • Roblox.Builders.Club.7.11.cod.keygen.by.Inferno.exe (PID: 2344)
      • keygen-step-3.exe (PID: 2180)
      • 3.exe (PID: 2892)
      • Loader_3.exe (PID: 3492)
    • Adds / modifies Windows certificates

      • krakentemp0000.exe (PID: 2172)
      • cscript.exe (PID: 1400)
    • Application launched itself

      • WinRAR.exe (PID: 3616)
      • key.exe (PID: 3852)
      • key.exe (PID: 2308)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2584)
    • Reads the cookies of Google Chrome

      • keygen-step-3.exe (PID: 956)
      • 3.exe (PID: 316)
      • keygen-step-3.exe (PID: 2180)
    • Creates files in the user directory

      • keygen-step-1.exe (PID: 3756)
      • intro.exe (PID: 3208)
      • key.exe (PID: 3852)
      • 002.exe (PID: 2924)
    • Reads Internet Cache Settings

      • keygen-step-1.exe (PID: 3756)
      • 3.exe (PID: 316)
      • cscript.exe (PID: 1400)
      • key.exe (PID: 3852)
      • keygen-step-1.exe (PID: 2568)
      • Loader_3.exe (PID: 3492)
      • cscript.exe (PID: 3252)
      • 002.exe (PID: 2924)
    • Starts CMD.EXE for self-deleting

      • keygen-step-3.exe (PID: 956)
      • 3.exe (PID: 316)
      • keygen-step-3.exe (PID: 2180)
      • 3.exe (PID: 2892)
    • Reads Windows Product ID

      • key.exe (PID: 2100)
      • key.exe (PID: 3604)
    • Reads the Windows organization settings

      • key.exe (PID: 2100)
      • key.exe (PID: 3604)
    • Reads Environment values

      • key.exe (PID: 2100)
      • key.exe (PID: 3604)
    • Reads Windows owner or organization settings

      • key.exe (PID: 2100)
      • key.exe (PID: 3604)
    • Loads DLL from Mozilla Firefox

      • key.exe (PID: 3852)
      • key.exe (PID: 2308)
    • Reads the cookies of Mozilla Firefox

      • 3.exe (PID: 316)
    • Executes scripts

      • Setup.exe (PID: 668)
      • Setup.exe (PID: 2396)
    • Searches for installed software

      • key.exe (PID: 3852)
      • 3.exe (PID: 316)
      • key.exe (PID: 2100)
      • key.exe (PID: 3604)
    • Creates files in the program directory

      • Setup.exe (PID: 668)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 2584)
    • Reads the hosts file

      • chrome.exe (PID: 2584)
      • chrome.exe (PID: 1760)
    • Manual execution by user

      • chrome.exe (PID: 2584)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 2584)
    • Reads settings of System Certificates

      • chrome.exe (PID: 1760)
    • Dropped object may contain Bitcoin addresses

      • keygen-step-4.exe (PID: 1956)
      • keygen-step-4.exe (PID: 4092)
    • Reads Microsoft Office registry keys

      • key.exe (PID: 2100)
      • key.exe (PID: 3604)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:10:04 12:22:18+02:00
PEType: PE32
LinkerVersion: 48
CodeSize: 98304
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x19e76
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: UAC
FileVersion: 1.0.0.0
InternalName: UAC.exe
LegalCopyright: Copyright © 2018
LegalTrademarks: -
OriginalFileName: UAC.exe
ProductName: UAC
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 04-Oct-2018 10:22:18
Debug artifacts:
  • C:\Users\Krypton\source\repos\UAC\UAC\obj\Release\UAC.pdb
Comments: -
CompanyName: -
FileDescription: UAC
FileVersion: 1.0.0.0
InternalName: UAC.exe
LegalCopyright: Copyright © 2018
LegalTrademarks: -
OriginalFilename: UAC.exe
ProductName: UAC
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 04-Oct-2018 10:22:18
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00002000
0x00017E7C
0x00018000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.23125
.rsrc
0x0001A000
0x0000057C
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.00735
.reloc
0x0001C000
0x0000000C
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.10191

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.00112
490
UNKNOWN
UNKNOWN
RT_MANIFEST

Imports

mscoree.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
77
Malicious processes
26
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start #KRAKEN kraken.exe eventvwr.exe no specs eventvwr.exe krakentemp0000.exe cmd.exe no specs ping.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe no specs winrar.exe chrome.exe no specs roblox.builders.club.7.11.cod.keygen.by.inferno.exe cmd.exe no specs intro.exe keygen-pr.exe #AZORULT keygen-step-1.exe keygen-step-3.exe keygen-step-4.exe cmd.exe no specs ping.exe no specs #PONY key.exe setup.exe no specs key.exe no specs setup.exe 3.exe cmd.exe no specs timeout.exe no specs cscript.exe loader_3.exe roblox.builders.club.7.11.cod.keygen.by.inferno.exe cmd.exe no specs intro.exe keygen-pr.exe #AZORULT keygen-step-1.exe keygen-step-3.exe keygen-step-4.exe cmd.exe no specs ping.exe no specs key.exe setup.exe no specs key.exe no specs setup.exe 3.exe cmd.exe no specs emfmgfeho.exe cmd.exe no specs cscript.exe timeout.exe no specs cmd.exe no specs 002.exe loader_3.exe jgjg_pytopm.exe

Process information

PID
CMD
Path
Indicators
Parent process
316"C:\Users\admin\AppData\Local\Temp\sib7B9A.tmp\0\3.exe" /sC:\Users\admin\AppData\Local\Temp\sib7B9A.tmp\0\3.exe
Setup.exe
User:
admin
Company:
Skype Technologies S.A.
Integrity Level:
HIGH
Description:
Skype Setup
Exit code:
0
Version:
8.64.0.88
Modules
Images
c:\users\admin\appdata\local\temp\sib7b9a.tmp\0\3.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
668"C:\Users\admin\AppData\Local\Temp\RarSFX2\Setup.exe" C:\Users\admin\AppData\Local\Temp\RarSFX2\Setup.exe
keygen-step-4.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
4.6
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx2\setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
760"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=980,16993090956023920977,18014337587420115479,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=8882124430429628416 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2456 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
864cmd /c ""C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen.bat" "C:\Windows\system32\cmd.exeRoblox.Builders.Club.7.11.cod.keygen.by.Inferno.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
956keygen-step-3.exe C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\keygen-step-3.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
976"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\admin\AppData\Local\Temp\WF1gad3Ct8 & timeout 2 & del /f /q "C:\Users\admin\AppData\Local\Temp\sib7B9A.tmp\0\3.exe"C:\Windows\system32\cmd.exe3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1296"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=980,16993090956023920977,18014337587420115479,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=5148622800862896823 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2804 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1380"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=980,16993090956023920977,18014337587420115479,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=3232770795885085162 --mojo-platform-channel-handle=3224 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1400"cscript.exe" pub4.vbs //e:vbscript //NOLOGOC:\Windows\system32\cscript.exe
Setup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Console Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\cscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1504intro.exe 1O5ZFC:\Users\admin\AppData\Local\Temp\RarSFX3\intro.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx3\intro.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wininet.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-user32-l1-1-0.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
Total events
9 138
Read events
8 783
Write events
350
Delete events
5

Modification events

(PID) Process:(2444) Kraken.exeKey:HKEY_CLASSES_ROOT\mscfile\shell\open\command
Operation:writeName:(default)
Value:
C:\Users\admin\AppData\Local\Temp\krakentemp0000.exe
(PID) Process:(2444) Kraken.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Payload
Value:
C:\Users\admin\AppData\Local\Temp\krakentemp0000.exe
(PID) Process:(2444) Kraken.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2444) Kraken.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2352) eventvwr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2352) eventvwr.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2172) krakentemp0000.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\krakentemp0000_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2172) krakentemp0000.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\krakentemp0000_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2172) krakentemp0000.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\krakentemp0000_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(2172) krakentemp0000.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\krakentemp0000_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
50
Suspicious files
159
Text files
500
Unknown types
26

Dropped files

PID
Process
Filename
Type
2584chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\d070cd37-a331-4550-aaa2-a403a0173835.tmp
MD5:
SHA256:
2584chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp
MD5:
SHA256:
2584chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old
MD5:
SHA256:
2584chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old~RF163f5f.TMP
MD5:
SHA256:
2444Kraken.exeC:\Users\admin\AppData\Local\Temp\krakentemp0000.exeexecutable
MD5:
SHA256:
2584chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:
SHA256:
2584chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
2584chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
2584chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
2584chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RF164059.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
34
TCP/UDP connections
108
DNS requests
65
Threats
85

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3492
Loader_3.exe
GET
302
8.211.23.107:80
http://nffiiload05.top/download.php?file=4.exe
US
malicious
3492
Loader_3.exe
GET
302
8.211.23.107:80
http://nffiiload05.top/download.php?file=6.exe
US
malicious
3852
key.exe
POST
172.67.192.106:80
http://www.oldhorse.info/
US
malicious
3208
intro.exe
GET
200
2.16.186.11:80
http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D
unknown
der
1.37 Kb
whitelisted
3852
key.exe
POST
200
172.67.192.106:80
http://oldhorse.info/a.php
US
malicious
3208
intro.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
3492
Loader_3.exe
GET
200
8.211.23.107:80
http://nffiiload05.top/downfiles/6.exe
US
executable
1.70 Mb
malicious
3852
key.exe
POST
172.67.192.106:80
http://www.oldhorse.info/
US
malicious
956
keygen-step-3.exe
POST
200
139.180.202.218:80
http://www.wdsfw34erf93.com/index.php/api/fb
US
text
24 b
whitelisted
2180
keygen-step-3.exe
POST
200
139.180.202.218:80
http://www.wdsfw34erf93.com/index.php/api/fb
US
text
24 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1760
chrome.exe
216.58.207.35:443
ssl.gstatic.com
Google Inc.
US
whitelisted
1760
chrome.exe
216.58.205.227:443
www.google.lv
Google Inc.
US
whitelisted
2172
krakentemp0000.exe
216.239.36.21:443
ipinfo.io
Google Inc.
US
whitelisted
1760
chrome.exe
142.250.74.195:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
1760
chrome.exe
172.217.22.77:443
accounts.google.com
Google Inc.
US
whitelisted
1760
chrome.exe
172.217.16.195:443
www.google.com.ua
Google Inc.
US
whitelisted
172.217.21.202:443
fonts.googleapis.com
Google Inc.
US
whitelisted
1760
chrome.exe
172.217.22.99:443
www.gstatic.com
Google Inc.
US
whitelisted
1760
chrome.exe
172.217.18.174:443
consent.google.com
Google Inc.
US
whitelisted
216.58.208.46:443
clients2.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
ipinfo.io
  • 216.239.36.21
  • 216.239.34.21
  • 216.239.38.21
  • 216.239.32.21
shared
clientservices.googleapis.com
  • 142.250.74.195
whitelisted
accounts.google.com
  • 172.217.22.77
shared
www.google.com.ua
  • 172.217.16.195
whitelisted
fonts.googleapis.com
  • 172.217.21.202
whitelisted
www.gstatic.com
  • 172.217.22.99
whitelisted
fonts.gstatic.com
  • 142.250.74.195
whitelisted
apis.google.com
  • 172.217.21.238
whitelisted
ogs.google.com.ua
  • 216.58.207.46
whitelisted
www.google.com
  • 172.217.16.164
malicious

Threats

PID
Process
Class
Message
2172
krakentemp0000.exe
A Network Trojan was detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
2172
krakentemp0000.exe
Potential Corporate Privacy Violation
ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io)
3756
keygen-step-1.exe
A Network Trojan was detected
ET TROJAN Win32/AZORult V3.3 Client Checkin M2
3756
keygen-step-1.exe
A Network Trojan was detected
AV TROJAN Azorult CnC Beacon
3756
keygen-step-1.exe
A Network Trojan was detected
STEALER [PTsecurity] AZORult v.3
3756
keygen-step-1.exe
A Network Trojan was detected
STEALER [PTsecurity] AZORult
956
keygen-step-3.exe
A Network Trojan was detected
STEALER [PTsecurity] Powerkatz32_2
956
keygen-step-3.exe
A Network Trojan was detected
STEALER [PTsecurity] Powerkatz32_2
3208
intro.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
3208
intro.exe
Potential Corporate Privacy Violation
POLICY [PTsecurity] IP Check Domain SSL certificate
26 ETPRO signatures available at the full report
Process
Message
3.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
Loader_3.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
3.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
emfmgfeho.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
002.exe
002
Loader_3.exe
%s------------------------------------------------ --- Themida Professional --- --- (c)2012 Oreans Technologies --- ------------------------------------------------
002.exe
http://ffdownload.online/business/receive
jgjg_pytopm.exe
jgjg_pytopm.exe
NtQueryInformationFile
jgjg_pytopm.exe