Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 23:03
Behavioral task
behavioral1
Sample
93da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30.exe
Resource
win7-20240220-en
General
-
Target
93da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30.exe
-
Size
943KB
-
MD5
8207f7cd4eba5c49f9c69fe81aab5e93
-
SHA1
aeee2c5d2dad87d496b859bc901e192416797517
-
SHA256
93da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30
-
SHA512
db1c5d622003a917afb303c1372870706d274d135ab4e4faf9540a9871e6829fb6a5bd194e9ab064ea316641d631b7ff834634beab32752e1d95c1964c14e1cc
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSs+ShEnSxlPWRvXNfvtM0VrEV85g:zQ5aILMCfmAUjzX6xQt+4EnSfeXcCaL
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0006000000023214-22.dat family_kpot -
Trickbot x86 loader 9 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4500-15-0x0000000002BE0000-0x0000000002C09000-memory.dmp trickbot_loader32 behavioral2/memory/4500-19-0x0000000002BE0000-0x0000000002C09000-memory.dmp trickbot_loader32 behavioral2/memory/4500-24-0x0000000002BE0000-0x0000000002C09000-memory.dmp trickbot_loader32 behavioral2/memory/1888-46-0x00000000029D0000-0x00000000029F9000-memory.dmp trickbot_loader32 behavioral2/memory/1888-59-0x00000000029D0000-0x00000000029F9000-memory.dmp trickbot_loader32 behavioral2/memory/448-80-0x0000000000DC0000-0x0000000000DE9000-memory.dmp trickbot_loader32 behavioral2/memory/448-94-0x0000000000DC0000-0x0000000000DE9000-memory.dmp trickbot_loader32 behavioral2/memory/4688-122-0x0000000000CB0000-0x0000000000CD9000-memory.dmp trickbot_loader32 behavioral2/memory/4688-131-0x0000000000CB0000-0x0000000000CD9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe Token: SeTcbPrivilege 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4500 93da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30.exe 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 1888 4500 93da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30.exe 86 PID 4500 wrote to memory of 1888 4500 93da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30.exe 86 PID 4500 wrote to memory of 1888 4500 93da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30.exe 86 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 1888 wrote to memory of 1616 1888 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 87 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 448 wrote to memory of 1684 448 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 97 PID 4688 wrote to memory of 1120 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 99 PID 4688 wrote to memory of 1120 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 99 PID 4688 wrote to memory of 1120 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 99 PID 4688 wrote to memory of 1120 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 99 PID 4688 wrote to memory of 1120 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 99 PID 4688 wrote to memory of 1120 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 99 PID 4688 wrote to memory of 1120 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 99 PID 4688 wrote to memory of 1120 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 99 PID 4688 wrote to memory of 1120 4688 93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\93da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30.exe"C:\Users\Admin\AppData\Local\Temp\93da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Roaming\WinSocket\93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exeC:\Users\Admin\AppData\Roaming\WinSocket\93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1616
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exeC:\Users\Admin\AppData\Roaming\WinSocket\93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1684
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exeC:\Users\Admin\AppData\Roaming\WinSocket\93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\93da783367d949aff309bb149bb6446d0313878cd20a6b7d64b019bbafb6eb30.exe
Filesize943KB
MD58207f7cd4eba5c49f9c69fe81aab5e93
SHA1aeee2c5d2dad87d496b859bc901e192416797517
SHA25693da673356d949aff308bb149bb5445d0313767cd20a5b6d54b018bbafb5eb30
SHA512db1c5d622003a917afb303c1372870706d274d135ab4e4faf9540a9871e6829fb6a5bd194e9ab064ea316641d631b7ff834634beab32752e1d95c1964c14e1cc
-
Filesize
29KB
MD59d322296ab742347a86e2d86e5791c22
SHA13ec488e40d3635c494a63e2021b84b454a6c7a94
SHA256942c1e316f269bc3a1fd10329018d3f95f9a083ec074fd0ae5d0f3deecbd5056
SHA512716c34c9e082aebb7a3d1312814161e3c4c3ad211fd655b10d59f553a3291bd76c108fbde4aa7894147fffcf31219f72bfc501ab42e9ac9ae09f733fb5f7a2cb