Edit tour

Windows Analysis Report
KRIS.exe

Overview

General Information

Sample name:KRIS.exe
Analysis ID:1474974
MD5:7df972989d1e9270fae876e67386d06b
SHA1:29475b5ec4f1257c76387c133967c81bc8555eb5
SHA256:496c93d17e8db2390eb63d49ae0d356ac7fd91fbba5b0948816250bdac081396
Infos:

Detection

Score:23
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

.NET source code contains potential unpacker
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • KRIS.exe (PID: 5296 cmdline: "C:\Users\user\Desktop\KRIS.exe" MD5: 7DF972989D1E9270FAE876E67386D06B)
    • WerFault.exe (PID: 3140 cmdline: C:\Windows\system32\WerFault.exe -u -p 5296 -s 1048 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched
Timestamp:2024-07-17T14:19:47.194676+0200
SID:2022930
Source Port:443
Destination Port:56793
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-17T14:19:07.034896+0200
SID:2022930
Source Port:443
Destination Port:49712
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results
Source: KRIS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: 8KRIS.PDB source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Users\user\Desktop\KRIS.PDBdbh source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\PresentationFramework.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: (C:\Windows\KRIS.pdb source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbicKeO@ source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: WindowsBase.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Xaml.pdbH source: WERD65.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERD65.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb`A source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbtralR@ source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 6_projectfiles_/build/releasenotdienstarchiver/kris.pdb* source: KRIS.exe
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: KRIS.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\PresentationFramework\v4.0_4.0.0.0__31bf3856ad364e35\PresentationFramework.pdb </RY source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\dll\PresentationFramework.pdbo source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xaml.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: WindowsBase.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Xaml.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: %_projectfiles_/build/release/kris.pdb source: KRIS.exe
Source: Binary string: #_projectfiles_/build/debug/kris.pdb; source: KRIS.exe
Source: Binary string: \??\C:\Windows\symbols\exe\KRIS.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\PresentationFramework\v4.0_4.0.0.0__31bf3856ad364e35\PresentationFramework.pdb source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\WindowsBase\v4.0_4.0.0.0__31bf3856ad364e35\WindowsBase.pdb source: KRIS.exe, 00000000.00000002.2359004711.0000000000956000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\KRIS.pdbpdbRIS.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERD65.tmp.dmp.4.dr
Source: Binary string: PresentationCore.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Xml.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: 6_projectfiles_/build/releasenotdienstarchiver/kris.pdb source: KRIS.exe
Source: Binary string: KRIS.pdb( source: WERD65.tmp.dmp.4.dr
Source: Binary string: WindowsBase.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Xaml\v4.0_4.0.0.0__b77a5c561934e089\System.Xaml.pdb_ source: KRIS.exe, 00000000.00000002.2359004711.0000000000956000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: oindoC:\Windows\KRIS.pdb source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: #_projectfiles_/build/debug/kris.pdb source: KRIS.exe
Source: Binary string: System.Configuration.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb@ source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.pdbP source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Configuration.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: 4e35\PresentationCore.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\PresentationFramework.pdb| source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\KRIS.pdbpdbmE source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\WindowsBase\v4.0_4.0.0.0__31bf3856ad364e35\WindowsBase.pdb! source: KRIS.exe, 00000000.00000002.2359004711.0000000000956000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Desktop\KRIS.PDB7 source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: PresentationCore.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp, WERD65.tmp.dmp.4.dr
Source: Binary string: %_projectfiles_/build/release/kris.pdb6 source: KRIS.exe
Source: Binary string: System.Xaml.ni.pdbRSDSDg{V source: WERD65.tmp.dmp.4.dr
Source: Binary string: PresentationCore.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Xaml.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Users\user\Desktop\KRIS.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Users\user\Desktop\KRIS.pdbdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\WindowsBase.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\Entwicklung\KRIS3\Aktuell\KRIS3\Current\Main\KrisClient\KrisClient\KrisClient\obj\Release\KRIS.pdb source: KRIS.exe
Source: Binary string: .opC:\Users\user\Desktop\KRIS.PDB source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Desktop\KRIS.pdb source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: symbols\exe\KRIS.pdb.pdbP source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Xaml\v4.0_4.0.0.0__b77a5c561934e089\System.Xaml.pdb source: KRIS.exe, 00000000.00000002.2359004711.0000000000956000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\exe\KRIS.pdbN source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr
Source: KRIS.exe, 00000000.00000002.2359453845.00000000026C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/KRIS;component/app.xaml
Source: KRIS.exe, 00000000.00000002.2359453845.0000000002747000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/Kriko.Kris.Core;component/UI/Styles/Themes/LightGray.xaml
Source: KRIS.exe, 00000000.00000002.2359453845.00000000026C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/app.xaml
Source: KRIS.exe, 00000000.00000002.2359453845.00000000026C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/app.baml
Source: KRIS.exeString found in binary or memory: http://schemas.infragistics.com/xaml
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\KRIS.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5296 -s 1048
Source: KRIS.exe, TaskFactory.csTask registration methods: 'ActivateOrCreateAndRun', 'CreateAndRun'
Source: KRIS.exe, GroupTaskViewModel.csTask registration methods: 'DoCreateTask'
Source: classification engineClassification label: sus23.evad.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\KRIS.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5296
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\59d619b6-b057-4303-aa29-aecadb5c237bJump to behavior
Source: KRIS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: KRIS.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\KRIS.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: KRIS.exeString found in binary or memory: 8/Kriko.Kris.Core;component/UI/Styles/AddButtonStyle.xaml?
Source: C:\Users\user\Desktop\KRIS.exeFile read: C:\Users\user\Desktop\KRIS.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\KRIS.exe "C:\Users\user\Desktop\KRIS.exe"
Source: C:\Users\user\Desktop\KRIS.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5296 -s 1048
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: msvcp140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\KRIS.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: KRIS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: KRIS.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: KRIS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: 8KRIS.PDB source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Users\user\Desktop\KRIS.PDBdbh source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\PresentationFramework.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: (C:\Windows\KRIS.pdb source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbicKeO@ source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: WindowsBase.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Xaml.pdbH source: WERD65.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WERD65.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb`A source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbtralR@ source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 6_projectfiles_/build/releasenotdienstarchiver/kris.pdb* source: KRIS.exe
Source: Binary string: System.Xml.ni.pdbRSDS# source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: KRIS.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\PresentationFramework\v4.0_4.0.0.0__31bf3856ad364e35\PresentationFramework.pdb </RY source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\dll\PresentationFramework.pdbo source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xaml.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: WindowsBase.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Xaml.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: %_projectfiles_/build/release/kris.pdb source: KRIS.exe
Source: Binary string: #_projectfiles_/build/debug/kris.pdb; source: KRIS.exe
Source: Binary string: \??\C:\Windows\symbols\exe\KRIS.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\PresentationFramework\v4.0_4.0.0.0__31bf3856ad364e35\PresentationFramework.pdb source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\WindowsBase\v4.0_4.0.0.0__31bf3856ad364e35\WindowsBase.pdb source: KRIS.exe, 00000000.00000002.2359004711.0000000000956000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\KRIS.pdbpdbRIS.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WERD65.tmp.dmp.4.dr
Source: Binary string: PresentationCore.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Xml.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: 6_projectfiles_/build/releasenotdienstarchiver/kris.pdb source: KRIS.exe
Source: Binary string: KRIS.pdb( source: WERD65.tmp.dmp.4.dr
Source: Binary string: WindowsBase.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Xaml\v4.0_4.0.0.0__b77a5c561934e089\System.Xaml.pdb_ source: KRIS.exe, 00000000.00000002.2359004711.0000000000956000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: oindoC:\Windows\KRIS.pdb source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: #_projectfiles_/build/debug/kris.pdb source: KRIS.exe
Source: Binary string: System.Configuration.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb@ source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.pdbP source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Configuration.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: 4e35\PresentationCore.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\PresentationFramework.pdb| source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Xml.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\KRIS.pdbpdbmE source: KRIS.exe, 00000000.00000002.2359004711.00000000009BA000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\WindowsBase\v4.0_4.0.0.0__31bf3856ad364e35\WindowsBase.pdb! source: KRIS.exe, 00000000.00000002.2359004711.0000000000956000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Desktop\KRIS.PDB7 source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: PresentationCore.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp, WERD65.tmp.dmp.4.dr
Source: Binary string: %_projectfiles_/build/release/kris.pdb6 source: KRIS.exe
Source: Binary string: System.Xaml.ni.pdbRSDSDg{V source: WERD65.tmp.dmp.4.dr
Source: Binary string: PresentationCore.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Xaml.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Users\user\Desktop\KRIS.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Users\user\Desktop\KRIS.pdbdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\WindowsBase.pdb source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: D:\Entwicklung\KRIS3\Aktuell\KRIS3\Current\Main\KrisClient\KrisClient\KrisClient\obj\Release\KRIS.pdb source: KRIS.exe
Source: Binary string: .opC:\Users\user\Desktop\KRIS.PDB source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Desktop\KRIS.pdb source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: symbols\exe\KRIS.pdb.pdbP source: KRIS.exe, 00000000.00000002.2358632158.00000000006E6000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Xaml\v4.0_4.0.0.0__b77a5c561934e089\System.Xaml.pdb source: KRIS.exe, 00000000.00000002.2359004711.0000000000956000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: PresentationFramework.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\exe\KRIS.pdbN source: KRIS.exe, 00000000.00000002.2359819911.000000001AF76000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WERD65.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WERD65.tmp.dmp.4.dr

Data Obfuscation

barindex
Source: KRIS.exe, TaskFactory.cs.Net Code: CreateAndRun
Source: C:\Users\user\Desktop\KRIS.exeCode function: 0_2_00007FF848F100BD pushad ; iretd 0_2_00007FF848F100C1
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeMemory allocated: 870000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeMemory allocated: 1A6A0000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\KRIS.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeQueries volume information: C:\Users\user\Desktop\KRIS.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\KRIS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Scheduled Task/Job
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
DLL Side-Loading
1
Scheduled Task/Job
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Software Packing
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1474974 Sample: KRIS.exe Startdate: 17/07/2024 Architecture: WINDOWS Score: 23 10 .NET source code contains potential unpacker 2->10 6 KRIS.exe 2 2->6         started        process3 process4 8 WerFault.exe 19 16 6->8         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://defaultcontainer/KRIS;component/app.xaml0%Avira URL Cloudsafe
http://foo/bar/app.baml0%Avira URL Cloudsafe
http://foo/app.xaml0%Avira URL Cloudsafe
http://schemas.infragistics.com/xaml0%Avira URL Cloudsafe
http://defaultcontainer/Kriko.Kris.Core;component/UI/Styles/Themes/LightGray.xaml0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://defaultcontainer/KRIS;component/app.xamlKRIS.exe, 00000000.00000002.2359453845.00000000026C8000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
http://schemas.infragistics.com/xamlKRIS.exefalse
  • Avira URL Cloud: safe
unknown
http://foo/bar/app.bamlKRIS.exe, 00000000.00000002.2359453845.00000000026C8000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://foo/app.xamlKRIS.exe, 00000000.00000002.2359453845.00000000026C8000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://defaultcontainer/Kriko.Kris.Core;component/UI/Styles/Themes/LightGray.xamlKRIS.exe, 00000000.00000002.2359453845.0000000002747000.00000004.00000800.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1474974
Start date and time:2024-07-17 14:17:50 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 25s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:KRIS.exe
Detection:SUS
Classification:sus23.evad.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.22
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target KRIS.exe, PID 5296 because it is empty
  • Report size getting too big, too many NtSetInformationFile calls found.
  • VT rate limit hit for: KRIS.exe
TimeTypeDescription
08:19:13API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):1.1080099061006878
Encrypted:false
SSDEEP:384:uUM6UH3IBG+2Vp7j7MajEvuzuiFVY4lO8uDW:iI2Vp7EagvuzuiFVY4lO8
MD5:A00A7615228147BD7D0E76F26D7312B5
SHA1:5CFF32F7552BE8318DD8AF6A3EE0432040B5D3F1
SHA-256:592524F144D6C96A240EFC6442FF3EA48D52522C0D70B92B0C17EBD222731B2C
SHA-512:5E750777BEBF28FF9547D4BB1F3831F815FA366AF28A81EFBFDDE73F0F0978441CBA9F7DC6A207BADF6335705210E88F5366F77C7043AF50AE517330665D7FBF
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.5.6.9.2.3.2.9.5.5.9.6.1.8.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.5.6.9.2.3.3.0.4.8.1.4.8.6.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.4.8.a.f.c.2.d.-.4.e.0.0.-.4.c.3.3.-.8.e.0.b.-.6.5.f.6.4.2.7.8.4.d.1.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.4.1.c.f.5.b.1.-.6.4.6.1.-.4.6.5.6.-.8.b.2.8.-.4.7.5.b.d.3.0.7.c.c.2.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.K.R.I.S...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.K.R.I.S...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.b.0.-.0.0.0.1.-.0.0.1.4.-.3.3.6.9.-.d.b.7.9.4.3.d.8.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.a.7.6.e.a.e.0.e.3.b.e.d.6.2.d.1.3.8.b.3.5.6.e.2.6.1.c.b.7.b.3.0.0.0.0.0.0.0.0.!.0.0.0.0.2.9.4.7.5.b.5.e.c.4.f.1.2.5.7.c.7.6.3.8.7.c.1.3.3.9.6.7.c.8.1.b.c.8.5.5.5.e.b.5.!.K.R.I.S...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8594
Entropy (8bit):3.699285556265489
Encrypted:false
SSDEEP:192:R6l7wVeJAV2Zwb6YEI/stEqgmfZZgOPrprr89bRmDUfPgz8m:R6lXJAUZwb6YEAKEqgmfng2qgQfG
MD5:5060C744A70B404685444C229DFF6A68
SHA1:04A347EF7A46BA69073B8C14489844AE7DC95553
SHA-256:E509493A621D75715D52C64B73F75C1ABDC86BE982B2310261B8BB26E2B6D072
SHA-512:5D4BC7191021B8389132BACAAF908A714070E514A68C446F24D79DC2BA8523EA3B4FF30CF6A31BDBCFEB58666351B4E9CAE18388219221013BB748980936E918
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.9.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4781
Entropy (8bit):4.465931771886282
Encrypted:false
SSDEEP:48:cvIwWl8zsDJg771I9yXeYWpW8VYS5Ym8M4J3+GE7F27yq8vZGEmfG6Allrd:uIjfdI71U7V2J3+XwWZXkKllrd
MD5:13A9C43F68987B8268F9F20EA9543535
SHA1:8F0A3E38EE1B7AE693654C486C4C8A648F37ED6D
SHA-256:88024BFBFD10D6F5B27909BE17E086ABDDCC4460F8CB4EA7364DE2F8D894C5A4
SHA-512:DE37D6E34894A3BC94E3CFFDF40F4537356CD14387BC25230BB3D46880AECDC441AE877E445E850FF27BD5F93DE1FA232A16444B0AB0CD37D6317EC523A54CB4
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="414921" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 16 streams, Wed Jul 17 12:18:50 2024, 0x1205a4 type
Category:dropped
Size (bytes):508190
Entropy (8bit):3.6223670826569463
Encrypted:false
SSDEEP:6144:Il5bplc5UdrT66YLBZBzYfaO5L9qrdosasL3QrD:ubplSZ6YV25L9qrdo8Qr
MD5:0AAEFB91EA70A92360472FAB7AF06694
SHA1:CD28040A2815F60B81B2513179CB275403F941D6
SHA-256:59B7BC982F2554C3F47165E950B87C6A6A7D09749095B2D9D1B92538E3A4DC41
SHA-512:5AB3E17A42DE268F80C4B4308B3B16C9F513D3B73C825125B5FBEF44D1BDE84237589829B948DCEAD3B1B42D613BC9B53FE90D75BDD0BA486749190ECB49734E
Malicious:false
Reputation:low
Preview:MDMP..a..... ..........f........................`...........$...4.......h...X........B..x]..........l.......8...........T...........P)..............#...........%..............................................................................eJ......D&......Lw......................T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.421751468452375
Encrypted:false
SSDEEP:6144:OSvfpi6ceLP/9skLmb0OTdWSPHaJG8nAgeMZMMhA2fX4WABlEnNc0uhiTw:tvloTdW+EZMM6DFyK03w
MD5:17A30BDEEF76483AA05044300F0B60C4
SHA1:AA2E14321C82A24C8CB3D59303A6404384C462D1
SHA-256:2DA8FFF04AF6FD806CF3651A0E111C7BD389119516A125C528F8E2DE9BFF81FE
SHA-512:3B00DCF708BB48E644F8AE438B80F8D2E92622A146AB1D4058FD6B15B902E0AA7B6E189287D25F3F9396532C922D765D3CC79E4AF3C286B81AA44C9A6D0FE417
Malicious:false
Reputation:low
Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..zC..................................................................................................................................................................................................................................................................................................................................................N........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):5.082623337885561
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
  • Win32 Executable (generic) a (10002005/4) 49.75%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Windows Screen Saver (13104/52) 0.07%
  • Generic Win/DOS Executable (2004/3) 0.01%
File name:KRIS.exe
File size:874'496 bytes
MD5:7df972989d1e9270fae876e67386d06b
SHA1:29475b5ec4f1257c76387c133967c81bc8555eb5
SHA256:496c93d17e8db2390eb63d49ae0d356ac7fd91fbba5b0948816250bdac081396
SHA512:124747253ef9d029f0155b6ba5fb5c101d62bc163744a8c605b98772e117d2da6843529f0ecbbd4659b5f189b981027b06f6dffdeaa0962473fb999b23bf993f
SSDEEP:24576:WzUoFGpYqYcTJKP5fE01lq0gfEghLIbno+SdyHiEc5mkfE9:MGpYqYcTJKP5fE01lq0gfEghLIbno+Sy
TLSH:C2055ADD97C5B66CE83C45BE7B713D27EE627647429999A0B2DF4A032FF26240887700
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......\.........."...0......(.......M... ...`....@.. ....................................@................................
Icon Hash:3370c4d6d6ec7192
Entrypoint:0x4d4d16
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x5CE312CD [Mon May 20 20:49:17 2019 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xd4cc40x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0xd60000x2548.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xda0000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xd4b8c0x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000xd2d1c0xd2e001372d1847131ceba5264722c4a115191False0.14403804831061054data5.0730647492808IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0xd60000x25480x260072c5def29e544ab256dfb3bca7ac909dFalse0.31537828947368424data4.03381510246356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xda0000xc0x200cee2ef2a050235f03f2bb5f4cea307e3False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xd61000x1628Device independent bitmap graphic, 64 x 128 x 8, image size 40960.2554654442877292
RT_GROUP_ICON0xd77380x14data1.1
RT_VERSION0xd775c0x39aOpenPGP Public Key0.42190889370932755
RT_MANIFEST0xd7b080xa39XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4069545280855942
DLLImport
mscoree.dll_CorExeMain

Download Network PCAP: filteredfull

TimestampSource PortDest PortSource IPDest IP
Jul 17, 2024 14:19:09.353971958 CEST53604471.1.1.1192.168.2.5
050100s020406080100

Click to jump to process

050100s0.00102030MB

Click to jump to process

  • File
  • Registry

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:08:18:47
Start date:17/07/2024
Path:C:\Users\user\Desktop\KRIS.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\KRIS.exe"
Imagebase:0x260000
File size:874'496 bytes
MD5 hash:7DF972989D1E9270FAE876E67386D06B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:08:18:49
Start date:17/07/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 5296 -s 1048
Imagebase:0x7ff791e90000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

Executed Functions

Memory Dump Source
  • Source File: 00000000.00000002.2360251000.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff848f10000_KRIS.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 37d7a56259c40e8c1e52d9f48a4be42c01055fd9f46a16d013e74b6ef4d81e8f
  • Instruction ID: 19c931cd210e29b94b6e11292004416eb8c325e80f22827e8f8e79e2c490edaa
  • Opcode Fuzzy Hash: 37d7a56259c40e8c1e52d9f48a4be42c01055fd9f46a16d013e74b6ef4d81e8f
  • Instruction Fuzzy Hash: ECF0287190EFCA0FD386F33848A95657FA0EF5571070900EBC049CB1D3DB089C098355