Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 23:50
Behavioral task
behavioral1
Sample
77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe
Resource
win7-20240221-en
General
-
Target
77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe
-
Size
1.3MB
-
MD5
f27b2be95b6ece50ea6bd1b4213b1cbe
-
SHA1
f098bc63868d32b157bf9f8d81668b5cb94a3de9
-
SHA256
77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b
-
SHA512
ebf64eda99957fbd999a32d34ce59fee7b79772e49f6bc2572c01ccc18db787bc9b46da61fed8c63bde01ed71a63ed7469134c00d558a16a8a9dbc691ed9fc3a
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1SdrzRjVYaQ/n2lbcMfcCGwdLn:E5aIwC+Agr6S/FYqOc2JFn
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral1/files/0x00390000000167ef-21.dat family_kpot -
Trickbot x86 loader 9 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2336-15-0x0000000000610000-0x0000000000639000-memory.dmp trickbot_loader32 behavioral1/memory/2336-19-0x0000000000610000-0x0000000000639000-memory.dmp trickbot_loader32 behavioral1/memory/2336-28-0x0000000000610000-0x0000000000639000-memory.dmp trickbot_loader32 behavioral1/memory/2416-55-0x0000000000550000-0x0000000000579000-memory.dmp trickbot_loader32 behavioral1/memory/2416-67-0x0000000000550000-0x0000000000579000-memory.dmp trickbot_loader32 behavioral1/memory/2096-90-0x0000000000580000-0x00000000005A9000-memory.dmp trickbot_loader32 behavioral1/memory/2096-102-0x0000000000580000-0x00000000005A9000-memory.dmp trickbot_loader32 behavioral1/memory/776-123-0x00000000003A0000-0x00000000003C9000-memory.dmp trickbot_loader32 behavioral1/memory/776-134-0x00000000003A0000-0x00000000003C9000-memory.dmp trickbot_loader32 -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 3 IoCs
pid Process 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 2096 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 776 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2524 sc.exe 2436 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 2552 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2552 powershell.exe Token: SeTcbPrivilege 2096 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe Token: SeTcbPrivilege 776 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 2096 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 776 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2536 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 28 PID 2336 wrote to memory of 2536 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 28 PID 2336 wrote to memory of 2536 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 28 PID 2336 wrote to memory of 2536 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 28 PID 2336 wrote to memory of 2556 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 29 PID 2336 wrote to memory of 2556 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 29 PID 2336 wrote to memory of 2556 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 29 PID 2336 wrote to memory of 2556 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 29 PID 2336 wrote to memory of 2664 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 32 PID 2336 wrote to memory of 2664 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 32 PID 2336 wrote to memory of 2664 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 32 PID 2336 wrote to memory of 2664 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 32 PID 2336 wrote to memory of 2416 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 34 PID 2336 wrote to memory of 2416 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 34 PID 2336 wrote to memory of 2416 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 34 PID 2336 wrote to memory of 2416 2336 77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe 34 PID 2664 wrote to memory of 2552 2664 cmd.exe 35 PID 2664 wrote to memory of 2552 2664 cmd.exe 35 PID 2664 wrote to memory of 2552 2664 cmd.exe 35 PID 2664 wrote to memory of 2552 2664 cmd.exe 35 PID 2556 wrote to memory of 2524 2556 cmd.exe 36 PID 2556 wrote to memory of 2524 2556 cmd.exe 36 PID 2556 wrote to memory of 2524 2556 cmd.exe 36 PID 2556 wrote to memory of 2524 2556 cmd.exe 36 PID 2536 wrote to memory of 2436 2536 cmd.exe 37 PID 2536 wrote to memory of 2436 2536 cmd.exe 37 PID 2536 wrote to memory of 2436 2536 cmd.exe 37 PID 2536 wrote to memory of 2436 2536 cmd.exe 37 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 2416 wrote to memory of 2748 2416 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 38 PID 1028 wrote to memory of 2096 1028 taskeng.exe 42 PID 1028 wrote to memory of 2096 1028 taskeng.exe 42 PID 1028 wrote to memory of 2096 1028 taskeng.exe 42 PID 1028 wrote to memory of 2096 1028 taskeng.exe 42 PID 2096 wrote to memory of 1744 2096 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 43 PID 2096 wrote to memory of 1744 2096 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 43 PID 2096 wrote to memory of 1744 2096 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 43 PID 2096 wrote to memory of 1744 2096 88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe 43 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe"C:\Users\Admin\AppData\Local\Temp\77f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
PID:2524
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exeC:\Users\Admin\AppData\Roaming\WinSocket\88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2748
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7578397D-AFF7-4078-84B6-5EE272311C95} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Roaming\WinSocket\88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exeC:\Users\Admin\AppData\Roaming\WinSocket\88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1744
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exeC:\Users\Admin\AppData\Roaming\WinSocket\88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\WinSocket\88f3e1b0c042f4700ed1fe4c9f888eeb746e8f33eb9f988c08b9a4b9bf8ac89b.exe
Filesize1.3MB
MD5f27b2be95b6ece50ea6bd1b4213b1cbe
SHA1f098bc63868d32b157bf9f8d81668b5cb94a3de9
SHA25677f3e1b0c042f4600ed1fe4c8f777eeb645e7f33eb9f977c07b8a4b8bf7ac79b
SHA512ebf64eda99957fbd999a32d34ce59fee7b79772e49f6bc2572c01ccc18db787bc9b46da61fed8c63bde01ed71a63ed7469134c00d558a16a8a9dbc691ed9fc3a