Analysis
-
max time kernel
70s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 14:12
Behavioral task
behavioral1
Sample
c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe
Resource
win7-20240903-en
General
-
Target
c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe
-
Size
1.5MB
-
MD5
e83ae2bb70cc2c59c4829d7f7fa88cb0
-
SHA1
7c0ee8a76e4f2518fb3c67c4a4df4f8566eb7016
-
SHA256
c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01e
-
SHA512
1a143a95ef9d1aeeefa31a851adc65ef1db4ebf2323107eb2f633435fb8358acc70541015caf86c48b44fb8fc95c8669d1585c2935116f173e9d32ce6989051d
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtpj/Yz6XVSvmHaZkI+oq6dTnHv5yIi734DHr0ESjdkMwa7:E5aIwC+Agr6St1lOqq+jCpLWgO
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral1/files/0x0008000000016d21-25.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2540-15-0x00000000002B0000-0x00000000002D9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 324 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe -
Loads dropped DLL 2 IoCs
pid Process 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe -
pid Process 2072 powershell.exe 2556 powershell.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2760 sc.exe 2716 sc.exe 2176 sc.exe 2188 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 2072 powershell.exe 2556 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeTcbPrivilege 324 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 324 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2380 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 30 PID 2540 wrote to memory of 2380 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 30 PID 2540 wrote to memory of 2380 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 30 PID 2540 wrote to memory of 2380 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 30 PID 2540 wrote to memory of 2896 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 31 PID 2540 wrote to memory of 2896 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 31 PID 2540 wrote to memory of 2896 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 31 PID 2540 wrote to memory of 2896 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 31 PID 2540 wrote to memory of 1812 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 32 PID 2540 wrote to memory of 1812 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 32 PID 2540 wrote to memory of 1812 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 32 PID 2540 wrote to memory of 1812 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 32 PID 2540 wrote to memory of 2736 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 36 PID 2540 wrote to memory of 2736 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 36 PID 2540 wrote to memory of 2736 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 36 PID 2540 wrote to memory of 2736 2540 c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe 36 PID 2380 wrote to memory of 2716 2380 cmd.exe 37 PID 2380 wrote to memory of 2716 2380 cmd.exe 37 PID 2380 wrote to memory of 2716 2380 cmd.exe 37 PID 2380 wrote to memory of 2716 2380 cmd.exe 37 PID 2896 wrote to memory of 2760 2896 cmd.exe 38 PID 2896 wrote to memory of 2760 2896 cmd.exe 38 PID 2896 wrote to memory of 2760 2896 cmd.exe 38 PID 2896 wrote to memory of 2760 2896 cmd.exe 38 PID 1812 wrote to memory of 2072 1812 cmd.exe 39 PID 1812 wrote to memory of 2072 1812 cmd.exe 39 PID 1812 wrote to memory of 2072 1812 cmd.exe 39 PID 1812 wrote to memory of 2072 1812 cmd.exe 39 PID 2736 wrote to memory of 2952 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 40 PID 2736 wrote to memory of 2952 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 40 PID 2736 wrote to memory of 2952 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 40 PID 2736 wrote to memory of 2952 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 40 PID 2736 wrote to memory of 1904 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 41 PID 2736 wrote to memory of 1904 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 41 PID 2736 wrote to memory of 1904 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 41 PID 2736 wrote to memory of 1904 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 41 PID 2736 wrote to memory of 2744 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 42 PID 2736 wrote to memory of 2744 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 42 PID 2736 wrote to memory of 2744 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 42 PID 2736 wrote to memory of 2744 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 42 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 PID 2736 wrote to memory of 2004 2736 c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe"C:\Users\Admin\AppData\Local\Temp\c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01eN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exeC:\Users\Admin\AppData\Roaming\WinSocket\c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2188
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2176
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2004
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {952A9AC9-E793-4710-834E-96AC1AB3C3F5} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:264
-
C:\Users\Admin\AppData\Roaming\WinSocket\c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exeC:\Users\Admin\AppData\Roaming\WinSocket\c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5050857d1c290e044817fc759f5f91598
SHA1e5695da9b9d022a878fda756816f7a6808ea4fba
SHA2566f92e86b8ba176c33aa3f5f011410abd749597c893e2b9f6e5fda7442d098955
SHA5128ac9ae47771e1f73061b6c573bd2c471aa035fe7a82c582fdb9389da4b1c3ed1eedc8f0e26107df35cdb4a683b1de90eaffe0f6892324fc0405f3dcf7c2f23ef
-
C:\Users\Admin\AppData\Roaming\WinSocket\c3ac2cb8607014bb044bd849fb099a97671afe2b8114343643006221a93aa01eN.exe
Filesize1.5MB
MD5e83ae2bb70cc2c59c4829d7f7fa88cb0
SHA17c0ee8a76e4f2518fb3c67c4a4df4f8566eb7016
SHA256c3ac2cb7506014bb044bd748fb098a86561afe2b7114343543005221a93aa01e
SHA5121a143a95ef9d1aeeefa31a851adc65ef1db4ebf2323107eb2f633435fb8358acc70541015caf86c48b44fb8fc95c8669d1585c2935116f173e9d32ce6989051d