URL:

https://k-storage.com/krnl_console_bootstrapper.exe

Full analysis: https://app.any.run/tasks/a3ccb3d0-8d4b-4251-8600-372b0b1848e8
Verdict: Malicious activity
Analysis date: August 22, 2021, 00:16:45
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

F7CEBB00B0CDE2288CBF2276F0E8F803

SHA1:

CA6A985BD5620F87019C6C024FBC47C7C0D0072E

SHA256:

D1E54509F59C494355FCC5DB97C087C82D7AA6166BCC7A001D540D0B5FB1C1B2

SSDEEP:

3:N8EsXA3OXL0JNJPWXEw4A:2EsXDXbEw4A

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • krnl_console_bootstrapper.exe (PID: 2756)
      • krnlss.exe (PID: 2956)
      • krnlss.exe (PID: 3656)
      • krnlss.exe (PID: 4060)
      • 7za.exe (PID: 1492)
    • Loads dropped or rewritten executable

      • Explorer.EXE (PID: 1724)
      • SearchProtocolHost.exe (PID: 3536)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2208)
      • iexplore.exe (PID: 888)
      • krnl_console_bootstrapper.exe (PID: 2756)
    • Reads Environment values

      • krnl_console_bootstrapper.exe (PID: 2756)
      • krnlss.exe (PID: 3656)
      • krnlss.exe (PID: 4060)
    • Starts Internet Explorer

      • Explorer.EXE (PID: 1724)
      • WinRAR.exe (PID: 2760)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2208)
    • Checks supported languages

      • krnl_console_bootstrapper.exe (PID: 2756)
      • krnlss.exe (PID: 2956)
      • krnlss.exe (PID: 3656)
      • krnlss.exe (PID: 4060)
      • 7za.exe (PID: 1492)
      • WinRAR.exe (PID: 2760)
    • Reads the computer name

      • krnl_console_bootstrapper.exe (PID: 2756)
      • krnlss.exe (PID: 2956)
      • krnlss.exe (PID: 4060)
      • WinRAR.exe (PID: 2760)
      • krnlss.exe (PID: 3656)
    • Drops a file that was compiled in debug mode

      • krnl_console_bootstrapper.exe (PID: 2756)
    • Drops a file with a compile date too recent

      • krnl_console_bootstrapper.exe (PID: 2756)
    • Application launched itself

      • krnlss.exe (PID: 2956)
    • Uses RUNDLL32.EXE to load library

      • Explorer.EXE (PID: 1724)
    • Creates files in the user directory

      • Explorer.EXE (PID: 1724)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 888)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2208)
      • iexplore.exe (PID: 888)
    • Checks supported languages

      • iexplore.exe (PID: 888)
      • iexplore.exe (PID: 2208)
      • rundll32.exe (PID: 924)
      • rundll32.exe (PID: 1336)
    • Reads the computer name

      • iexplore.exe (PID: 888)
      • iexplore.exe (PID: 2208)
      • rundll32.exe (PID: 1336)
    • Application launched itself

      • iexplore.exe (PID: 888)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 888)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2208)
      • krnl_console_bootstrapper.exe (PID: 2756)
      • iexplore.exe (PID: 888)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 888)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 888)
    • Manual execution by user

      • krnlss.exe (PID: 2956)
      • rundll32.exe (PID: 924)
      • krnlss.exe (PID: 4060)
      • 7za.exe (PID: 1492)
    • Changes settings of System certificates

      • iexplore.exe (PID: 888)
    • Creates files in the user directory

      • iexplore.exe (PID: 888)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
13
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe krnl_console_bootstrapper.exe searchprotocolhost.exe no specs krnlss.exe no specs krnlss.exe no specs rundll32.exe no specs krnlss.exe no specs 7za.exe no specs explorer.exe no specs rundll32.exe no specs winrar.exe no specs iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
888"C:\Program Files\Internet Explorer\iexplore.exe" "https://k-storage.com/krnl_console_bootstrapper.exe"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
924"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\krnl\krnlss.exe.configC:\Windows\system32\rundll32.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\rundll32.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\imagehlp.dll
1336"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\krnl\krnl.dllC:\Windows\system32\rundll32.exeExplorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1492"C:\Users\admin\Desktop\7za.exe" C:\Users\admin\Desktop\7za.exeExplorer.EXE
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Standalone Console
Exit code:
0
Version:
15.14
Modules
Images
c:\users\admin\desktop\7za.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1724C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
1816"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2760.37692\Monaco\Monaco.htmlC:\Program Files\Internet Explorer\iexplore.exeWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2208"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:888 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2756"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\krnl_console_bootstrapper.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\krnl_console_bootstrapper.exe
iexplore.exe
User:
admin
Integrity Level:
MEDIUM
Description:
krnl_console_bootstrapper
Exit code:
3221225786
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\krnl_console_bootstrapper.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2760"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\krnl\bin\Monaco.zip"C:\Program Files\WinRAR\WinRAR.exeExplorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2956"C:\Users\admin\Desktop\krnl\krnlss.exe" C:\Users\admin\Desktop\krnl\krnlss.exeExplorer.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
krnlss
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\krnl\krnlss.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
30 220
Read events
29 897
Write events
320
Delete events
3

Modification events

(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
139080064
(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30906091
(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
439085923
(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30906091
(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(888) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
8
Suspicious files
13
Text files
35
Unknown types
11

Dropped files

PID
Process
Filename
Type
888iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{45ED4AD8-02DE-11EC-A146-12A9866C77DE}.datbinary
MD5:
SHA256:
2208iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27der
MD5:
SHA256:
2208iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:
SHA256:
2756krnl_console_bootstrapper.exeC:\Users\admin\Desktop\krnl\bin\src.7z
MD5:
SHA256:
888iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF70D71E7F1B73671A.TMPgmc
MD5:
SHA256:
2208iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
2208iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\krnl_console_bootstrapper[1].exeexecutable
MD5:
SHA256:
2208iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:F7DCB24540769805E5BB30D193944DCE
SHA256:6B88C6AC55BBD6FEA0EBE5A760D1AD2CFCE251C59D0151A1400701CB927E36EA
2756krnl_console_bootstrapper.exeC:\Users\admin\Desktop\krnl\krnlss.exeexecutable
MD5:
SHA256:
888iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\krnl_console_bootstrapper.exe.fhcn33u.partial:Zone.Identifiertext
MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
SHA256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
31
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1672
svchost.exe
GET
304
205.185.216.42:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?ed53382d525bee76
US
whitelisted
888
iexplore.exe
GET
304
205.185.216.42:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?08043ec6c48f7cfe
US
whitelisted
1672
svchost.exe
GET
304
205.185.216.42:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?ee0438397e8fdef2
US
whitelisted
888
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
888
iexplore.exe
GET
304
205.185.216.42:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?85587a30e0c21101
US
whitelisted
2208
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
888
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
888
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
888
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D
US
der
471 b
whitelisted
2208
iexplore.exe
GET
200
2.16.186.26:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?27c8c75b4b618b71
unknown
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2208
iexplore.exe
104.21.42.186:443
k-storage.com
Cloudflare Inc
US
unknown
2208
iexplore.exe
2.16.186.26:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
2208
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2756
krnl_console_bootstrapper.exe
104.21.42.186:443
k-storage.com
Cloudflare Inc
US
unknown
2756
krnl_console_bootstrapper.exe
172.67.147.98:443
cdn.krnl.ca
US
malicious
888
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1672
svchost.exe
205.185.216.42:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
888
iexplore.exe
205.185.216.42:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
888
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
888
iexplore.exe
204.79.197.200:443
ieonline.microsoft.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
k-storage.com
  • 104.21.42.186
  • 172.67.208.22
malicious
ctldl.windowsupdate.com
  • 2.16.186.26
  • 2.16.186.33
  • 205.185.216.42
  • 205.185.216.10
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
cdn.krnl.ca
  • 172.67.147.98
  • 104.21.39.171
malicious
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted
go.microsoft.com
  • 104.111.242.51
whitelisted
www.msn.com
  • 204.79.197.203
whitelisted
query.prod.cms.msn.com
  • 13.92.246.37
whitelisted

Threats

No threats detected
No debug info