Threat Database Trojans Trojan.Kryptik.KZE

Trojan.Kryptik.KZE

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.Kryptik.KZE
Signature status: Hash Mismatch

Known Samples

MD5: a327beca69c0f59c3fc55a595c5ed96f
SHA1: 95331fbf7855ff72dd8f4c220b3df5b87dd4b691
SHA256: B9221CE62F05BC36DEFF369C042CC5BC9696BE5D62F5EACF5E32012E37AEA5FE
File Size: 5.91 MB, 5905456 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Microsoft Corporation
File Description Host Process for COM objects
File Version 10.0.21029.3191 (WinBuild.162526.4029)
Internal Name dllhost.exe
Legal Copyright © Microsoft Corporation. All rights reserved.
Original Filename dllhost.exe
Product Name Microsoft® Windows® Operating System
Product Version 10.0.21029.3191

Digital Signatures

Signer Root Status
Microsoft Windows Microsoft Windows Production PCA 2011 Hash Mismatch

File Traits

  • x86

Block Information

Total Blocks: 91
Potentially Malicious Blocks: 25
Whitelisted Blocks: 66
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x x x x 0 x x x x x x x x x x x x x x x x x x x 0 x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\roaming\microsoft\runtimebroker\002f4b7f.exe Generic Write,Read Attributes

Windows API Usage

Category API
User Data Access
  • GetComputerName
  • GetComputerNameEx
  • GetUserName
Anti Debug
  • IsDebuggerPresent
Network Winhttp
  • WinHttpOpen
Network Wininet
  • InternetQueryOption
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Network Winsock2
  • WSAGetOverlappedResult
  • WSARecvFrom
  • WSASend
  • WSASendTo
  • WSASocket
  • WSAStartup
  • WSAttemptAutodialName
Network Winsock
  • bind
  • closesocket
  • freeaddrinfo
  • getaddrinfo
  • getpeername
  • getsockname
  • setsockopt
  • socket
Network Info Queried
  • GetAdaptersAddresses

Shell Command Execution

C:\Users\Fumcbqzv\AppData\Roaming\Microsoft\RuntimeBroker\002f4b7f.exe (NULL)

Trending

Most Viewed

Loading...