File name:

kryptex-setup-4.43.1.exe

Full analysis: https://app.any.run/tasks/3fffa287-f22d-4472-8116-84ec6f0baba4
Verdict: Malicious activity
Analysis date: August 29, 2024, 06:11:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
crypto-regex
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

F5A788A2660E604B818A432B4A9667C1

SHA1:

7BCFD0B649B48334278F3D5F2B1EB5A3717AA4CA

SHA256:

A71A9A54B44C6FB3157A6D84F762FEED3007A07FAD020D57A3C253CEDA9D3D83

SSDEEP:

786432:6Bp5P4IZoB1nDa2F8U0QKDNoLke78h1G13L/:6Bp5wNB1DR8U0QKDNoLke4h1GN/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Adds path to the Windows Defender exclusion list

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • Uses Task Scheduler to run other applications

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • Changes the autorun value in the registry

      • Kryptex.exe (PID: 1064)
  • SUSPICIOUS

    • Starts POWERSHELL.EXE for commands execution

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • Drops the executable file immediately after the start

      • kryptex-setup-4.43.1.exe (PID: 3900)
      • Kryptex.exe (PID: 936)
      • Kryptex.exe (PID: 1064)
    • Script adds exclusion path to Windows Defender

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • Executable content was dropped or overwritten

      • kryptex-setup-4.43.1.exe (PID: 3900)
      • Kryptex.exe (PID: 936)
      • Kryptex.exe (PID: 1064)
    • The process creates files with name similar to system file names

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • Drops 7-zip archiver for unpacking

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • Creates a software uninstall entry

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • Reads security settings of Internet Explorer

      • kryptex-setup-4.43.1.exe (PID: 3900)
      • Kryptex.exe (PID: 4084)
    • Deletes scheduled task without confirmation

      • schtasks.exe (PID: 568)
      • schtasks.exe (PID: 6996)
    • Application launched itself

      • Kryptex.exe (PID: 1920)
      • Kryptex.exe (PID: 2520)
    • Process drops legitimate windows executable

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • The process executes via Task Scheduler

      • Kryptex.exe (PID: 2520)
    • Starts CMD.EXE for commands execution

      • Kryptex.exe (PID: 936)
      • Kryptex.exe (PID: 1064)
    • Uses WMIC.EXE to obtain operating system information

      • Kryptex.exe (PID: 1064)
    • Starts application with an unusual extension

      • cmd.exe (PID: 400)
    • Uses WMIC.EXE to obtain network information

      • cmd.exe (PID: 1148)
      • cmd.exe (PID: 3908)
      • cmd.exe (PID: 7468)
      • cmd.exe (PID: 7208)
    • Uses WMIC.EXE to obtain data on the virtual memory file swapping

      • Kryptex.exe (PID: 1064)
    • Uses WMIC.EXE to obtain local storage devices information

      • Kryptex.exe (PID: 1064)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 3840)
      • cmd.exe (PID: 888)
    • Found regular expressions for crypto-addresses (YARA)

      • Kryptex.exe (PID: 1064)
  • INFO

    • Create files in a temporary directory

      • kryptex-setup-4.43.1.exe (PID: 3900)
      • Kryptex.exe (PID: 1920)
      • Kryptex.exe (PID: 936)
      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 1064)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 1932)
      • powershell.exe (PID: 236)
      • powershell.exe (PID: 2640)
    • Checks supported languages

      • kryptex-setup-4.43.1.exe (PID: 3900)
      • Kryptex.exe (PID: 1920)
      • Kryptex.exe (PID: 2040)
      • Kryptex.exe (PID: 7164)
      • Kryptex.exe (PID: 3908)
      • Kryptex.exe (PID: 936)
      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 4528)
      • Kryptex.exe (PID: 3784)
      • Kryptex.exe (PID: 1064)
      • Kryptex.exe (PID: 4284)
      • Kryptex.exe (PID: 4084)
      • adlinfo.exe (PID: 5760)
      • chcp.com (PID: 2024)
      • pagefile.exe (PID: 3160)
      • adlinfo.exe (PID: 5740)
      • adlinfo.exe (PID: 7040)
      • adlinfo.exe (PID: 2360)
      • adlinfo.exe (PID: 5212)
      • adlinfo.exe (PID: 7712)
      • adlinfo.exe (PID: 7652)
      • identity_helper.exe (PID: 7916)
      • adlinfo.exe (PID: 5160)
      • adlinfo.exe (PID: 7508)
      • adlinfo.exe (PID: 7588)
      • adlinfo.exe (PID: 8104)
      • adlinfo.exe (PID: 7188)
      • adlinfo.exe (PID: 5304)
      • adlinfo.exe (PID: 300)
      • adlinfo.exe (PID: 8028)
      • adlinfo.exe (PID: 7024)
      • adlinfo.exe (PID: 7320)
      • adlinfo.exe (PID: 6576)
      • adlinfo.exe (PID: 8136)
      • adlinfo.exe (PID: 7204)
      • adlinfo.exe (PID: 6656)
      • adlinfo.exe (PID: 7680)
      • adlinfo.exe (PID: 7764)
      • adlinfo.exe (PID: 320)
      • adlinfo.exe (PID: 8084)
      • adlinfo.exe (PID: 8024)
      • Kryptex.exe (PID: 7212)
      • adlinfo.exe (PID: 5000)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 236)
      • powershell.exe (PID: 2640)
      • powershell.exe (PID: 1932)
    • Creates files in the program directory

      • kryptex-setup-4.43.1.exe (PID: 3900)
    • Creates files or folders in the user directory

      • kryptex-setup-4.43.1.exe (PID: 3900)
      • Kryptex.exe (PID: 2040)
      • Kryptex.exe (PID: 1920)
      • Kryptex.exe (PID: 4528)
      • Kryptex.exe (PID: 4284)
      • Kryptex.exe (PID: 3908)
      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 1064)
      • Kryptex.exe (PID: 7212)
    • Reads product name

      • Kryptex.exe (PID: 1920)
      • Kryptex.exe (PID: 936)
      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 1064)
    • Reads the computer name

      • Kryptex.exe (PID: 1920)
      • kryptex-setup-4.43.1.exe (PID: 3900)
      • Kryptex.exe (PID: 7164)
      • Kryptex.exe (PID: 3908)
      • Kryptex.exe (PID: 936)
      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 4284)
      • Kryptex.exe (PID: 3784)
      • Kryptex.exe (PID: 1064)
      • Kryptex.exe (PID: 4084)
      • pagefile.exe (PID: 3160)
      • identity_helper.exe (PID: 7916)
      • Kryptex.exe (PID: 7212)
    • Manual execution by a user

      • Kryptex.exe (PID: 1920)
      • msedge.exe (PID: 2056)
    • Process checks computer location settings

      • Kryptex.exe (PID: 1920)
      • Kryptex.exe (PID: 1064)
      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 936)
      • Kryptex.exe (PID: 4084)
    • Reads Environment values

      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 1064)
      • Kryptex.exe (PID: 936)
      • Kryptex.exe (PID: 1920)
      • identity_helper.exe (PID: 7916)
    • Checks proxy server information

      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 1920)
    • Reads the software policy settings

      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 1920)
    • Reads the machine GUID from the registry

      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 1920)
      • Kryptex.exe (PID: 7212)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 6296)
      • WMIC.exe (PID: 6696)
      • WMIC.exe (PID: 5040)
      • WMIC.exe (PID: 6716)
      • WMIC.exe (PID: 1812)
      • WMIC.exe (PID: 7036)
      • WMIC.exe (PID: 6920)
      • WMIC.exe (PID: 1356)
      • WMIC.exe (PID: 4008)
      • WMIC.exe (PID: 5988)
      • WMIC.exe (PID: 7520)
      • WMIC.exe (PID: 7292)
      • WMIC.exe (PID: 6368)
    • Reads CPU info

      • Kryptex.exe (PID: 2520)
      • Kryptex.exe (PID: 1064)
    • Changes the display of characters in the console

      • chcp.com (PID: 2024)
    • Reads Microsoft Office registry keys

      • Kryptex.exe (PID: 4084)
      • msedge.exe (PID: 2056)
      • msedge.exe (PID: 5760)
    • Application launched itself

      • msedge.exe (PID: 5760)
      • msedge.exe (PID: 2056)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:12:15 22:26:14+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 473088
UninitializedDataSize: 16384
EntryPoint: 0x338f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.43.1.1704
ProductVersionNumber: 4.43.1.1704
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Kryptex
FileDescription: Kryptex desktop app
FileVersion: 4.43.1.1704
LegalCopyright: Copyright © 2024 Kryptex
ProductName: Kryptex
ProductVersion: 4.43.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
395
Monitored processes
279
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start kryptex-setup-4.43.1.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs kryptex.exe no specs kryptex.exe no specs kryptex.exe no specs kryptex.exe kryptex.exe comppkgsrv.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs kryptex.exe no specs kryptex.exe no specs kryptex.exe no specs kryptex.exe THREAT kryptex.exe comppkgsrv.exe no specs wmic.exe no specs conhost.exe no specs kryptex.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs chcp.com no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs pagefile.exe no specs conhost.exe no specs msedge.exe no specs adlinfo.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs conhost.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe wmic.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs wmic.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmic.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs kryptex.exe no specs msedge.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs adlinfo.exe no specs conhost.exe no specs kryptex-setup-4.43.1.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236powershell -c Add-MpPreference -ExclusionPath \"C:\Program Files\Kryptex\"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exekryptex-setup-4.43.1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
300"C:\Program Files\Kryptex\resources\app.asar.unpacked\node_modules\kryptex-backend\node_modules\amd-binding\build\Release\adlinfo.exe"C:\Program Files\Kryptex\resources\app.asar.unpacked\node_modules\kryptex-backend\node_modules\amd-binding\build\Release\adlinfo.exeKryptex.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\program files\kryptex\resources\app.asar.unpacked\node_modules\kryptex-backend\node_modules\amd-binding\build\release\adlinfo.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
320"C:\Program Files\Kryptex\resources\app.asar.unpacked\node_modules\kryptex-backend\node_modules\amd-binding\build\Release\adlinfo.exe"C:\Program Files\Kryptex\resources\app.asar.unpacked\node_modules\kryptex-backend\node_modules\amd-binding\build\Release\adlinfo.exeKryptex.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\program files\kryptex\resources\app.asar.unpacked\node_modules\kryptex-backend\node_modules\amd-binding\build\release\adlinfo.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
400C:\WINDOWS\system32\cmd.exe /d /s /c "chcp"C:\Windows\System32\cmd.exeKryptex.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
400"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2536 --field-trial-handle=2328,i,17667317319290434012,2110613904846253678,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
460\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exereg.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
568schtasks /delete /f /tn KryptexElevationFromStartupC:\Windows\SysWOW64\schtasks.exekryptex-setup-4.43.1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
644\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
644\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
780reg query HKLM\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 /v RadeonSoftwareVersionC:\Windows\System32\reg.exeKryptex.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
Total events
55 363
Read events
55 161
Write events
145
Delete events
57

Modification events

(PID) Process:(1932) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1932) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1932) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1932) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(236) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(236) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(236) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(236) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3900) kryptex-setup-4.43.1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\30437907-294f-51ea-92cc-027b1d3d13a2
Operation:writeName:InstallLocation
Value:
C:\Program Files\Kryptex
(PID) Process:(3900) kryptex-setup-4.43.1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\30437907-294f-51ea-92cc-027b1d3d13a2
Operation:writeName:KeepShortcuts
Value:
true
Executable files
38
Suspicious files
262
Text files
108
Unknown types
1

Dropped files

PID
Process
Filename
Type
3900kryptex-setup-4.43.1.exeC:\Users\admin\AppData\Local\Temp\nskF18D.tmp\app-64.7z
MD5:
SHA256:
3900kryptex-setup-4.43.1.exeC:\Program Files\Kryptex\icudtl.dat
MD5:
SHA256:
1932powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:BD04EB78FB7ACB828915E535E7D9D379
SHA256:19631DAA72952BC4FC84D3916F07DC354E97B7743228BF9E98BCCAF320E90FA0
3900kryptex-setup-4.43.1.exeC:\Program Files\Kryptex\LICENSES.chromium.html
MD5:
SHA256:
1932powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_udubzkrt.odg.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
236powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ybwogoen.jdn.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
3900kryptex-setup-4.43.1.exeC:\Users\admin\AppData\Local\Temp\nskF18D.tmp\System.dllexecutable
MD5:0D7AD4F45DC6F5AA87F606D0331C6901
SHA256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
3900kryptex-setup-4.43.1.exeC:\Users\admin\AppData\Local\Temp\nskF18D.tmp\nsProcess.dllexecutable
MD5:F0438A894F3A7E01A4AAE8D1B5DD0289
SHA256:30C6C3DD3CC7FCEA6E6081CE821ADC7B2888542DAE30BF00E881C0A105EB4D11
3900kryptex-setup-4.43.1.exeC:\Users\admin\AppData\Local\Temp\nskF18D.tmp\SpiderBanner.dllexecutable
MD5:17309E33B596BA3A5693B4D3E85CF8D7
SHA256:996A259E53CA18B89EC36D038C40148957C978C0FD600A268497D4C92F882A93
236powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_hatl4mit.jyh.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
157
TCP/UDP connections
127
DNS requests
102
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
OPTIONS
200
23.48.23.26:443
https://bzib.nelreports.net/api/report?cat=bingbusiness
unknown
unknown
GET
302
136.244.85.57:443
https://www.kryptex.com/site/dashboard
unknown
unknown
GET
401
13.107.6.158:443
https://business.bing.com/api/v1/user/token/microsoftgraph?&clienttype=edge-omnibox
unknown
unknown
GET
200
13.107.42.16:443
https://config.edge.skype.com/config/v1/Edge/122.0.2365.59?clientId=4489578223053569932&agents=Edge%2CEdgeConfig%2CEdgeServices%2CEdgeFirstRun%2CEdgeFirstRunConfig&osname=win&client=edge&channel=stable&scpfre=0&osarch=x86_64&osver=10.0.19045&wu=1&devicefamily=desktop&uma=0&sessionid=43&mngd=0&installdate=1661339457&edu=0&bphint=2&soobedate=1504771245&fg=1
unknown
binary
13.3 Kb
unknown
GET
200
23.48.23.65:443
https://9a7f6a3c-8431-438c-89d9-90924a59e618.akamaized.net/static/v2/dist/public.759e2890108a.css
unknown
text
258 Kb
unknown
POST
200
78.46.91.122:443
https://sentry-app.kryptex.org/api/6/envelope/
unknown
binary
2 b
unknown
POST
429
78.46.91.122:443
https://sentry-app.kryptex.org/api/6/envelope/
unknown
binary
45 b
unknown
POST
429
78.46.91.122:443
https://sentry-app.kryptex.org/api/6/envelope/
unknown
binary
45 b
unknown
GET
200
136.244.85.57:443
https://www.kryptex.com/login?next=/site/dashboard
unknown
html
13.6 Kb
unknown
GET
200
13.107.246.67:443
https://edge-mobile-static.azureedge.net/eccp/get?settenant=edge-config&setplatform=win&setmkt=en-US&setchannel=stable
unknown
binary
13.7 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
4284
Kryptex.exe
78.46.91.122:443
sentry-app.kryptex.org
Hetzner Online GmbH
DE
whitelisted
3908
Kryptex.exe
78.46.91.122:443
sentry-app.kryptex.org
Hetzner Online GmbH
DE
whitelisted
1064
Kryptex.exe
136.244.85.57:443
api.kryptex.com
AS-CHOOPA
DE
unknown
400
msedge.exe
136.244.85.57:443
api.kryptex.com
AS-CHOOPA
DE
unknown
2056
msedge.exe
239.255.255.250:1900
whitelisted
400
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
sentry-app.kryptex.org
  • 78.46.91.122
whitelisted
api.kryptex.com
  • 136.244.85.57
unknown
config.edge.skype.com
  • 13.107.42.16
whitelisted
www.kryptex.com
  • 136.244.85.57
unknown
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.60
whitelisted
api.edgeoffer.microsoft.com
  • 94.245.104.56
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
No debug info