URL:

https://k-storage.com/krnl_bootstrapper.exe

Full analysis: https://app.any.run/tasks/0de4df78-35ff-4fde-a969-a4a23b6ed5cf
Verdict: Malicious activity
Analysis date: March 05, 2022, 17:25:09
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

BE8BDFD89816E3EFF894F6866DE85E17

SHA1:

FB450E1E156A32C2D01E3E4B8F71C5FBBFB0F1F3

SHA256:

6C86401F5FC675E2AA611F42C4051AAC6625A05DAB2E8FCF81F1A766A736934B

SSDEEP:

3:N8EsXA3OXL0qDXEw4A:2EsXDXxLEw4A

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • krnl_bootstrapper.exe (PID: 3908)
      • 7za.exe (PID: 3712)
      • 7za.exe (PID: 1296)
    • Loads dropped or rewritten executable

      • krnl_bootstrapper.exe (PID: 3908)
      • SearchProtocolHost.exe (PID: 3876)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2100)
    • Drops a file with a compile date too recent

      • iexplore.exe (PID: 2100)
      • iexplore.exe (PID: 3648)
      • 7za.exe (PID: 1296)
      • krnl_bootstrapper.exe (PID: 3908)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2100)
      • iexplore.exe (PID: 3648)
      • krnl_bootstrapper.exe (PID: 3908)
      • 7za.exe (PID: 1296)
    • Drops a file that was compiled in debug mode

      • iexplore.exe (PID: 2100)
      • iexplore.exe (PID: 3648)
      • krnl_bootstrapper.exe (PID: 3908)
      • 7za.exe (PID: 1296)
    • Reads the computer name

      • krnl_bootstrapper.exe (PID: 3908)
      • 7za.exe (PID: 3712)
      • 7za.exe (PID: 1296)
      • krnlss.exe (PID: 3676)
    • Checks supported languages

      • krnl_bootstrapper.exe (PID: 3908)
      • 7za.exe (PID: 3712)
      • 7za.exe (PID: 1296)
      • krnlss.exe (PID: 3676)
    • Reads Environment values

      • krnl_bootstrapper.exe (PID: 3908)
      • krnlss.exe (PID: 3676)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2100)
      • iexplore.exe (PID: 3648)
      • WISPTIS.EXE (PID: 3016)
    • Reads the computer name

      • iexplore.exe (PID: 3648)
      • iexplore.exe (PID: 2100)
      • WISPTIS.EXE (PID: 3016)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2100)
      • iexplore.exe (PID: 3648)
    • Changes internet zones settings

      • iexplore.exe (PID: 3648)
    • Application launched itself

      • iexplore.exe (PID: 3648)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2100)
      • krnl_bootstrapper.exe (PID: 3908)
      • iexplore.exe (PID: 3648)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 3648)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3648)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
9
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start iexplore.exe iexplore.exe krnl_bootstrapper.exe wisptis.exe no specs wisptis.exe searchprotocolhost.exe no specs 7za.exe no specs 7za.exe krnlss.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3648"C:\Program Files\Internet Explorer\iexplore.exe" "https://k-storage.com/krnl_bootstrapper.exe"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2100"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3648 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3908"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\krnl_bootstrapper.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\krnl_bootstrapper.exe
iexplore.exe
User:
admin
Integrity Level:
MEDIUM
Description:
krnl_bootstrapper
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\krnl_bootstrapper.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2220"C:\Windows\SYSTEM32\WISPTIS.EXE" /ManualLaunch;C:\Windows\SYSTEM32\WISPTIS.EXEkrnl_bootstrapper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Pen and Touch Input Component
Exit code:
3221226540
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wisptis.exe
c:\windows\system32\ntdll.dll
3016"C:\Windows\SYSTEM32\WISPTIS.EXE" /ManualLaunch;C:\Windows\SYSTEM32\WISPTIS.EXE
krnl_bootstrapper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Pen and Touch Input Component
Exit code:
24
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wisptis.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\ole32.dll
c:\windows\system32\usp10.dll
3876"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3712"C:\Users\admin\Desktop\krnl\7za.exe" x "C:\Users\admin\Desktop\krnl\bin\Monaco.zip" -o"C:\Users\admin\Desktop\krnl\bin" -aoa -bsp1C:\Users\admin\Desktop\krnl\7za.exekrnl_bootstrapper.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Standalone Console
Exit code:
0
Version:
15.14
Modules
Images
c:\users\admin\desktop\krnl\7za.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1296"C:\Users\admin\Desktop\krnl\7za.exe" x "C:\Users\admin\Desktop\krnl\bin\src.7z" -o"C:\Users\admin\Desktop\krnl\bin" -aoa -bsp1C:\Users\admin\Desktop\krnl\7za.exe
krnl_bootstrapper.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Standalone Console
Exit code:
0
Version:
15.14
Modules
Images
c:\users\admin\desktop\krnl\7za.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
3676"C:\Users\admin\Desktop\krnl\krnlss.exe" C:\Users\admin\Desktop\krnl\krnlss.exekrnl_bootstrapper.exe
User:
admin
Integrity Level:
MEDIUM
Description:
krnlss
Version:
1.0.0.0
Total events
22 736
Read events
22 553
Write events
183
Delete events
0

Modification events

(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30945461
(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
171002607
(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30945462
(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3648) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
139
Suspicious files
9
Text files
45
Unknown types
69

Dropped files

PID
Process
Filename
Type
2100iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27der
MD5:DA88139982344840957D6915DB4CCE99
SHA256:F9F896AF7BDE8022323B5D08B82AA4F0676278F914F53CE1B66F23FCD166FC0C
3648iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFCEE5D89EED217292.TMPgmc
MD5:EF59BEF50EE6F4E3F4D06497700C0C0E
SHA256:AA9C035695DF42A3BFA94492BF583412ED04EDBF1F7BAE1DEB0C89014D098FBA
2100iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:D29EE2D021F7ED50E47CD101DAF02DBF
SHA256:09A9DAC747BB184549F602E3E78E2E661DDA57EDB6A9E12416DE630972833911
3648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{35F2AA64-9CA9-11EC-9D0A-12A9866C77DE}.datbinary
MD5:D2808DFD074F6E364374C18CA12798E6
SHA256:AFDBCE78D0CCD8490A4DAFD2746D07270CAE9AE151E39F033249E154F6826240
2100iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:F7DCB24540769805E5BB30D193944DCE
SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA
2100iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:550A733928BAD2C2F129E27B346AFC33
SHA256:984E2D26B4A2B357139596FBC2D57E15539C8226280468E16A120E2F59F3C008
2100iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\krnl_bootstrapper[1].exeexecutable
MD5:5332998BD933A7999AD2B432A2737681
SHA256:AF6318EF27ADE1A41AAC89551316AF63728B7A2715EDC8B5F899D006EF9484ED
3648iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\krnl_bootstrapper.exe.ejgtd8y.partial:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
2100iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\krnl_bootstrapper.exe.ejgtd8y.partialexecutable
MD5:88A6615157FAFBEFEA10E5207D54E292
SHA256:426A066A7C5ED3E91F9AB5AADB860E969FBF74689179E02FA3B3D5E5E36CBD6E
3908krnl_bootstrapper.exeC:\Users\admin\Desktop\krnl\7z.NET.dllexecutable
MD5:982475050787051658ABD42E890A2469
SHA256:4E193CCDA4EF7EC7FC1BC12D7ABBA225A9AF5B4612AA0B67A02324B9DA8B268C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
12
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3648
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
2100
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
2100
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c7e1f7930a058e5f
US
compressed
4.70 Kb
whitelisted
2100
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a35110f3454ba4f2
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2100
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2100
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3908
krnl_bootstrapper.exe
104.21.94.62:443
cdn.krnl.ca
Cloudflare Inc
US
unknown
3648
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2100
iexplore.exe
188.114.96.7:443
k-storage.com
Cloudflare Inc
US
malicious
3908
krnl_bootstrapper.exe
188.114.96.7:443
k-storage.com
Cloudflare Inc
US
malicious
3648
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
k-storage.com
  • 188.114.96.7
  • 188.114.97.7
malicious
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cdn.krnl.ca
  • 104.21.94.62
  • 172.67.220.81
malicious
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted

Threats

No threats detected
No debug info