Analysis
-
max time kernel
134s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 19:35
Behavioral task
behavioral1
Sample
228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe
Resource
win7-20240705-en
General
-
Target
228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe
-
Size
1.1MB
-
MD5
5541596d4c829f1773a3bbc1536c07d1
-
SHA1
530049bb28d09d67b6c3c576ae7a8c5998678904
-
SHA256
228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232
-
SHA512
a9cffc973401bfe25951e3093b2be6d95cad31936dd1c6f7de2020b70d22054d204868054205dbaea68dd2a7ec23424cf565e3afefbb03ec2cafc6be5ed36c00
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU9+s8juCCIG:E5aIwC+Agr6SNasrsFC9G
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\WinSocket\229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/2992-15-0x00000000003B0000-0x00000000003D9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exepid process 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe 2668 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe 1060 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe -
Loads dropped DLL 2 IoCs
Processes:
228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exepid process 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 2788 sc.exe 1992 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.execmd.exepowershell.exe228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.execmd.exesc.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.execmd.exesc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exepowershell.exepid process 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe 1892 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exedescription pid process Token: SeDebugPrivilege 1892 powershell.exe Token: SeTcbPrivilege 2668 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe Token: SeTcbPrivilege 1060 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exepid process 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe 2668 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe 1060 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.execmd.execmd.execmd.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exetaskeng.exe229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exedescription pid process target process PID 2992 wrote to memory of 1252 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 1252 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 1252 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 1252 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 1884 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 1884 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 1884 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 1884 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 2340 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 2340 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 2340 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 2340 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe cmd.exe PID 2992 wrote to memory of 1972 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe PID 2992 wrote to memory of 1972 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe PID 2992 wrote to memory of 1972 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe PID 2992 wrote to memory of 1972 2992 228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe PID 1252 wrote to memory of 1992 1252 cmd.exe sc.exe PID 1252 wrote to memory of 1992 1252 cmd.exe sc.exe PID 1252 wrote to memory of 1992 1252 cmd.exe sc.exe PID 1252 wrote to memory of 1992 1252 cmd.exe sc.exe PID 1884 wrote to memory of 2788 1884 cmd.exe sc.exe PID 1884 wrote to memory of 2788 1884 cmd.exe sc.exe PID 1884 wrote to memory of 2788 1884 cmd.exe sc.exe PID 1884 wrote to memory of 2788 1884 cmd.exe sc.exe PID 2340 wrote to memory of 1892 2340 cmd.exe powershell.exe PID 2340 wrote to memory of 1892 2340 cmd.exe powershell.exe PID 2340 wrote to memory of 1892 2340 cmd.exe powershell.exe PID 2340 wrote to memory of 1892 2340 cmd.exe powershell.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 1972 wrote to memory of 2444 1972 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 2560 wrote to memory of 2668 2560 taskeng.exe 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe PID 2560 wrote to memory of 2668 2560 taskeng.exe 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe PID 2560 wrote to memory of 2668 2560 taskeng.exe 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe PID 2560 wrote to memory of 2668 2560 taskeng.exe 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe PID 2668 wrote to memory of 2700 2668 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 2668 wrote to memory of 2700 2668 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 2668 wrote to memory of 2700 2668 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe PID 2668 wrote to memory of 2700 2668 229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe"C:\Users\Admin\AppData\Local\Temp\228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Users\Admin\AppData\Roaming\WinSocket\229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exeC:\Users\Admin\AppData\Roaming\WinSocket\229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2444
-
C:\Windows\system32\taskeng.exetaskeng.exe {575F1EE2-B306-43D3-87A0-EE625BF39B9E} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Roaming\WinSocket\229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exeC:\Users\Admin\AppData\Roaming\WinSocket\229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2700
-
C:\Users\Admin\AppData\Roaming\WinSocket\229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exeC:\Users\Admin\AppData\Roaming\WinSocket\229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\WinSocket\229c1294a3639f2ba96d20bc9249622e38d1b2d87c89a08ae9a049aa8dee9232.exe
Filesize1.1MB
MD55541596d4c829f1773a3bbc1536c07d1
SHA1530049bb28d09d67b6c3c576ae7a8c5998678904
SHA256228c1284a3538f2ba85d20bc9248522e37d1b2d76c79a07ae9a049aa7dee8232
SHA512a9cffc973401bfe25951e3093b2be6d95cad31936dd1c6f7de2020b70d22054d204868054205dbaea68dd2a7ec23424cf565e3afefbb03ec2cafc6be5ed36c00