Analysis
-
max time kernel
134s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04-08-2024 22:11
Behavioral task
behavioral1
Sample
5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe
Resource
win7-20240704-en
General
-
Target
5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe
-
Size
876KB
-
MD5
e3e8b29c9448c367073cb513a456efa8
-
SHA1
7fd1a4dae878fca22e2f3455777e03335ac45bf7
-
SHA256
5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e
-
SHA512
93c732baa90acb41f75bf276d178cfdaf0cb0acf285693410aa23405615994a028c416a095c6cdac0e99735a135815ed6c595466ecacf5ad2401d4e402dda4e1
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQGCsksQjn6YHldGm1ufSD8GlOu:zQ5aILMCfmAUjzX6xQGCZLFdGm13Jr
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015d39-20.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2392-15-0x00000000024E0000-0x0000000002509000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 1044 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 2412 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe -
pid Process 1804 powershell.exe 1656 powershell.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3064 sc.exe 3048 sc.exe 2772 sc.exe 2624 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 1804 powershell.exe 1656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 1656 powershell.exe Token: SeTcbPrivilege 1044 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe Token: SeTcbPrivilege 2412 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 1044 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 2412 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2784 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 30 PID 2392 wrote to memory of 2784 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 30 PID 2392 wrote to memory of 2784 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 30 PID 2392 wrote to memory of 2784 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 30 PID 2392 wrote to memory of 2484 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 31 PID 2392 wrote to memory of 2484 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 31 PID 2392 wrote to memory of 2484 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 31 PID 2392 wrote to memory of 2484 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 31 PID 2392 wrote to memory of 2276 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 32 PID 2392 wrote to memory of 2276 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 32 PID 2392 wrote to memory of 2276 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 32 PID 2392 wrote to memory of 2276 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 32 PID 2392 wrote to memory of 2836 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 36 PID 2392 wrote to memory of 2836 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 36 PID 2392 wrote to memory of 2836 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 36 PID 2392 wrote to memory of 2836 2392 5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe 36 PID 2836 wrote to memory of 2636 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 37 PID 2836 wrote to memory of 2636 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 37 PID 2836 wrote to memory of 2636 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 37 PID 2836 wrote to memory of 2636 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 37 PID 2836 wrote to memory of 2864 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 38 PID 2836 wrote to memory of 2864 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 38 PID 2836 wrote to memory of 2864 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 38 PID 2836 wrote to memory of 2864 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 38 PID 2484 wrote to memory of 2624 2484 cmd.exe 39 PID 2484 wrote to memory of 2624 2484 cmd.exe 39 PID 2484 wrote to memory of 2624 2484 cmd.exe 39 PID 2484 wrote to memory of 2624 2484 cmd.exe 39 PID 2836 wrote to memory of 2952 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 40 PID 2836 wrote to memory of 2952 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 40 PID 2836 wrote to memory of 2952 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 40 PID 2836 wrote to memory of 2952 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 40 PID 2784 wrote to memory of 2772 2784 cmd.exe 42 PID 2784 wrote to memory of 2772 2784 cmd.exe 42 PID 2784 wrote to memory of 2772 2784 cmd.exe 42 PID 2784 wrote to memory of 2772 2784 cmd.exe 42 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 PID 2836 wrote to memory of 2612 2836 6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe 44 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe"C:\Users\Admin\AppData\Local\Temp\5ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exeC:\Users\Admin\AppData\Roaming\WinSocket\6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2612
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1AE0B23E-7655-4111-8C93-A8B1F4996003} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1688
-
C:\Users\Admin\AppData\Roaming\WinSocket\6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exeC:\Users\Admin\AppData\Roaming\WinSocket\6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1840
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exeC:\Users\Admin\AppData\Roaming\WinSocket\6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5f9e3aaa84ed1518158ea88c48ac7c7d1
SHA186f38738cf7c2ff2a0d4f58ce5efde760b53bb21
SHA256ba1c349346918152e06acdeeb5738bb9150411f9635ad61f8180604fd600fa80
SHA51242e753924207e3107b04e8f53975ed0c752ea453b9c098359cdada8808915ebde2f2433eb15482ee4ad67b7b48ddef144403f1e063d34b213b8f56b07e9746d8
-
\Users\Admin\AppData\Roaming\WinSocket\6ef69913139ee49449ea294ff0cefbeb3a944f831b28da6360fb0067981e842e.exe
Filesize876KB
MD5e3e8b29c9448c367073cb513a456efa8
SHA17fd1a4dae878fca22e2f3455777e03335ac45bf7
SHA2565ef58813138ee49449ea284ff0cefbeb3a944f731b27da5350fb0056871e742e
SHA51293c732baa90acb41f75bf276d178cfdaf0cb0acf285693410aa23405615994a028c416a095c6cdac0e99735a135815ed6c595466ecacf5ad2401d4e402dda4e1