Analysis
-
max time kernel
155s -
max time network
162s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 12:57
Static task
static1
Behavioral task
behavioral1
Sample
kpot.exe
Resource
win7v20210410
General
-
Target
kpot.exe
-
Size
85KB
-
MD5
1562b53d6506283b35d3beaf2dec92e8
-
SHA1
fcf2918829132cd43890129b8255f1d1533e07ab
-
SHA256
76c39773f1b2801f46d8856d7ad46b97ef500ac07febec3f0bcf623c326aea87
-
SHA512
3ecc8951c9dd308b59a69f7966956abf703c58d8f2f6ca059f9a9350e8d6679eb8063c7c31e4247cfd1cf31f2e2296c53b57b46f9c5b50fdf59c196950ac51b4
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000673ffba58fd80445a3025cbb4d85a7e50000000002000000000010660000000100002000000020929ea8f50a3f2addeda2ad7ee7f92554aa318e007bd258e20dac3dd6ac5751000000000e8000000002000020000000c33ac6fa6eb4ed1ceb8c79b98ac12ecc714287dd1e4c0a726adafec728d7c9f2200000005125874d0e62b168bacca593c8cd7f3ce497ab7ef25e08495fb461fc222a05bb40000000dcd6edbeca0fa7492709d1b9cbee43c33ed351faaf1c99abdef37bca53f3e689030969e0e9f78dadeceee91acf1934cfb3445a9dc301d9d4ada4289566f5a8ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A07646B-EA33-11EB-B2DB-DAB543A68B6E} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "333692830" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b3e695407ed701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30899776" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "333644244" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1629303988" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1596022203" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30899776" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30899776" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "333660838" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0490f96407ed701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1596022203" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000673ffba58fd80445a3025cbb4d85a7e5000000000200000000001066000000010000200000002633d585207dc58198771cd09a9cdd492571af4da5e5da8812341691721cb801000000000e80000000020000200000005a4e97f110c14094d102b56eac3b01a52897d22df703dabfbd966a3100c33dda20000000c96a3ea3095674fc0cd2640029e6f7fc7e913ea8201f639c6b4a36dbf8f5695040000000f5785cd9e620852eba1c64aa0dee1b252babc26d1d8fb6d80eae93e0c1a1a1e4783b316d3653b4e584686497e44a96fab4f017c89e0cefb0a7a734e73e59eb3e iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
kpot.exepid process 416 kpot.exe 416 kpot.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2216 iexplore.exe 2216 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
iexplore.exedescription pid process target process PID 2216 wrote to memory of 2860 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2860 2216 iexplore.exe IEXPLORE.EXE PID 2216 wrote to memory of 2860 2216 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\kpot.exe"C:\Users\Admin\AppData\Local\Temp\kpot.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:416
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:3432
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
4e64ee3a1f4c34f528e8de9b728dbca6
SHA19b27bb889cc2fe2fbb89c0c7c8aa16a841291499
SHA256ec75d601fb9309c65a60ad6bd10b10c5927c77648d42de670003dc0b2693105b
SHA512e23b06910c9009d254dba06b1fe8910d10fd0c11cf0ad22ebf21cf41765da0f51f9179eeb39ca7317cf3ccfcce01622914171ebb9e7c661373dbc92acf9676bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
813f6f5fe92b94423aacd37c9ded8293
SHA10aa75460d57412627a94db8ef8d7ee54e712dd89
SHA256cb2b7f13bb318671469fa4096f72809dc3a04f60ebd4af635fc8ca736fdec2f0
SHA512d5fdb229eda5754214ade6c6a6fa313780b5f2bb2ca42eb85f67b62d0e8231f0e24d407a97fb729d1d2fce6e9629d0911f2b6797786197d0cfd180425f9cabd8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1750K2PW.cookieMD5
c9884f05133e084d3f5a506741425d81
SHA1f21efa726c3205613ff28f237f9ea75ad08ead64
SHA2564a9b35c57f195033300b551359d601f0b7c8ca3b264eef8f4e303c118fbd951e
SHA512c64a333c37b567bf53be496fe239e8846788316324742bdcfe0f25dd845d1fef9f8899eb0d9b4ff18bc3e9e3abfe8fdf8a67e7d55c7a29d2c3b7ce34f5192cdc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\LTMIF43S.cookieMD5
7607131523b5d7f2626de9ea19a361f5
SHA1affcdea48de278d2f0b30ac8d29ea9665fe4b7b5
SHA2564b71fe8a0969e8ee0d1fac4337d6129b994b581962e5ce896f576d0fb67cc26b
SHA5126fdc7bbd4fb8cc0a5b93b278a11c1b989904c5e787873867777252ffdd1ad33af47a36bac0ec16a27ff9c1ad680940f6e1ae872b9235908a031e1ed95f28cbf6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\MBNC96YF.cookieMD5
2a9991fff1f7e65abc66aaa88f07c24e
SHA13fa629f7d71797c60a11b348ab9b57280c794d7b
SHA256d35ff788b6c1f49369819c407b182987426b484747a29d4dd8da6c4089653f31
SHA512413808308996b4549f0a6e31cdd4bf2c2b5526eb7fbc252a65894f520f621f83f98a2834fd93adf62879de9c8b5d70e328fcf7dee5dd874c59bfb19ecbf975db
-
memory/2216-114-0x00007FFFAB820000-0x00007FFFAB88B000-memory.dmpFilesize
428KB
-
memory/2860-115-0x0000000000000000-mapping.dmp