Analysis

  • max time kernel
    135s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 02:45

General

  • Target

    ad98ebcd253e8a00c1db7ffcad1560e145443502b69d057ae22585f697d2d773.exe

  • Size

    1.6MB

  • MD5

    309db6cee33cc2b6f29d73366f485524

  • SHA1

    7af3deb5792f1ebefc663672b269655eec723ad6

  • SHA256

    ad98ebcd253e8a00c1db7ffcad1560e145443502b69d057ae22585f697d2d773

  • SHA512

    0f81a3a3418da2a3807026e22d5968465f2db9cc6ac898a6282ec66cd611b68e5d1967fae2c2f6a5e0c63d9a0942fd7925e7384266fa157d608cd0a790d9dcaa

  • SSDEEP

    24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/BxL+XKHZjb//8ISgHa:E5aIwC+Agr6SqCPGC6HZkIT/S

Malware Config

Signatures

  • KPOT

    KPOT is an information stealer that steals user data and account credentials.

  • KPOT Core Executable 1 IoCs
  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 1 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad98ebcd253e8a00c1db7ffcad1560e145443502b69d057ae22585f697d2d773.exe
    "C:\Users\Admin\AppData\Local\Temp\ad98ebcd253e8a00c1db7ffcad1560e145443502b69d057ae22585f697d2d773.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\cmd.exe
      /c sc stop WinDefend
      2⤵
        PID:2132
        • C:\Windows\SysWOW64\sc.exe
          sc stop WinDefend
          3⤵
          • Launches sc.exe
          PID:3020
      • C:\Windows\SysWOW64\cmd.exe
        /c sc delete WinDefend
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\sc.exe
          sc delete WinDefend
          3⤵
          • Launches sc.exe
          PID:2540
      • C:\Windows\SysWOW64\cmd.exe
        /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableRealtimeMonitoring $true
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2624
      • C:\Users\Admin\AppData\Roaming\WinSocket\ad99ebcd263e9a00c1db8ffcad1670e146443602b79d068ae22696f798d2d883.exe
        C:\Users\Admin\AppData\Roaming\WinSocket\ad99ebcd263e9a00c1db8ffcad1670e146443602b79d068ae22696f798d2d883.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Windows\SysWOW64\cmd.exe
          /c sc stop WinDefend
          3⤵
            PID:2648
            • C:\Windows\SysWOW64\sc.exe
              sc stop WinDefend
              4⤵
              • Launches sc.exe
              PID:2016
          • C:\Windows\SysWOW64\cmd.exe
            /c sc delete WinDefend
            3⤵
              PID:2556
              • C:\Windows\SysWOW64\sc.exe
                sc delete WinDefend
                4⤵
                • Launches sc.exe
                PID:2768
            • C:\Windows\SysWOW64\cmd.exe
              /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
              3⤵
                PID:300
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell Set-MpPreference -DisableRealtimeMonitoring $true
                  4⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3036
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe
                3⤵
                  PID:2528
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {B04E4A91-D334-4A86-9737-99C0A2FE5178} S-1-5-18:NT AUTHORITY\System:Service:
              1⤵
                PID:1156
                • C:\Users\Admin\AppData\Roaming\WinSocket\ad99ebcd263e9a00c1db8ffcad1670e146443602b79d068ae22696f798d2d883.exe
                  C:\Users\Admin\AppData\Roaming\WinSocket\ad99ebcd263e9a00c1db8ffcad1670e146443602b79d068ae22696f798d2d883.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:836
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe
                    3⤵
                      PID:2224
                  • C:\Users\Admin\AppData\Roaming\WinSocket\ad99ebcd263e9a00c1db8ffcad1670e146443602b79d068ae22696f798d2d883.exe
                    C:\Users\Admin\AppData\Roaming\WinSocket\ad99ebcd263e9a00c1db8ffcad1670e146443602b79d068ae22696f798d2d883.exe
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:2468
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe
                      3⤵
                        PID:2452

                  Network

                  MITRE ATT&CK Matrix ATT&CK v13

                  Execution

                  System Services

                  1
                  T1569

                  Service Execution

                  1
                  T1569.002

                  Persistence

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Privilege Escalation

                  Create or Modify System Process

                  1
                  T1543

                  Windows Service

                  1
                  T1543.003

                  Defense Evasion

                  Impair Defenses

                  1
                  T1562

                  Discovery

                  Query Registry

                  1
                  T1012

                  Impact

                  Service Stop

                  1
                  T1489

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                    Filesize

                    7KB

                    MD5

                    b3fb43c371282a6bba7de25bba5df182

                    SHA1

                    dcd51ad53285ad6c1e991f13aa4022b261c8b83b

                    SHA256

                    9c64a0506e61d5c5385eb9e546f8e829d6fb6b56a9190b8cb3a015c67a390e64

                    SHA512

                    e652fd734c05e12753da6d1ab60127b5aefbdd0fae8bf7da1e98995f1f3be08b502860ba08de74c3a64bfeae46a13d3b0e282d8c0df50ad9f7a170ecbbefb652

                  • \Users\Admin\AppData\Roaming\WinSocket\ad99ebcd263e9a00c1db8ffcad1670e146443602b79d068ae22696f798d2d883.exe
                    Filesize

                    1.6MB

                    MD5

                    309db6cee33cc2b6f29d73366f485524

                    SHA1

                    7af3deb5792f1ebefc663672b269655eec723ad6

                    SHA256

                    ad98ebcd253e8a00c1db7ffcad1560e145443502b69d057ae22585f697d2d773

                    SHA512

                    0f81a3a3418da2a3807026e22d5968465f2db9cc6ac898a6282ec66cd611b68e5d1967fae2c2f6a5e0c63d9a0942fd7925e7384266fa157d608cd0a790d9dcaa

                  • memory/836-77-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-74-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-75-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-76-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-73-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-78-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-71-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-70-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-69-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-68-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-67-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/836-72-0x00000000003A0000-0x00000000003A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-14-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-6-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-17-0x0000000000421000-0x0000000000422000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-13-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-3-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-4-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-10-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-2-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-5-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-18-0x0000000000400000-0x0000000000472000-memory.dmp
                    Filesize

                    456KB

                  • memory/2116-9-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-8-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-7-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-15-0x00000000003C0000-0x00000000003E9000-memory.dmp
                    Filesize

                    164KB

                  • memory/2116-12-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2116-11-0x0000000000260000-0x0000000000261000-memory.dmp
                    Filesize

                    4KB

                  • memory/2468-94-0x0000000000390000-0x0000000000391000-memory.dmp
                    Filesize

                    4KB

                  • memory/2528-50-0x0000000010000000-0x000000001001E000-memory.dmp
                    Filesize

                    120KB

                  • memory/2528-51-0x0000000010000000-0x000000001001E000-memory.dmp
                    Filesize

                    120KB

                  • memory/2664-39-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-30-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-31-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-32-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-33-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-34-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-35-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-36-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-37-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-38-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-40-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-41-0x0000000000270000-0x0000000000271000-memory.dmp
                    Filesize

                    4KB

                  • memory/2664-45-0x0000000010000000-0x0000000010007000-memory.dmp
                    Filesize

                    28KB

                  • memory/2664-44-0x0000000000400000-0x0000000000472000-memory.dmp
                    Filesize

                    456KB