Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 02:31
Behavioral task
behavioral1
Sample
c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879.exe
Resource
win7-20240221-en
General
-
Target
c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879.exe
-
Size
1.3MB
-
MD5
665caf9715e0387a6d145da916939414
-
SHA1
72f1aa8bece1f7548db284fadf87fafcc2baf60f
-
SHA256
c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879
-
SHA512
e47ba3f758ae0509272937ec79e30fdc367025a479ed0e28bda986cf7ed938cf9f10180c0d589cb0033b7c906a9cdfba54a91cdde18076ab4809b1deb27709f0
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOFZ+jJ/1q0GrbcUxnMj0Uv:E5aIwC+Agr6StVEnmcKWnq0vlj0i
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023328-22.dat family_kpot -
Trickbot x86 loader 9 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1292-15-0x0000000003110000-0x0000000003139000-memory.dmp trickbot_loader32 behavioral2/memory/1292-19-0x0000000003110000-0x0000000003139000-memory.dmp trickbot_loader32 behavioral2/memory/1292-25-0x0000000003110000-0x0000000003139000-memory.dmp trickbot_loader32 behavioral2/memory/1312-45-0x00000000029C0000-0x00000000029E9000-memory.dmp trickbot_loader32 behavioral2/memory/1312-59-0x00000000029C0000-0x00000000029E9000-memory.dmp trickbot_loader32 behavioral2/memory/1992-80-0x0000000000CF0000-0x0000000000D19000-memory.dmp trickbot_loader32 behavioral2/memory/1992-94-0x0000000000CF0000-0x0000000000D19000-memory.dmp trickbot_loader32 behavioral2/memory/1748-117-0x0000000000DF0000-0x0000000000E19000-memory.dmp trickbot_loader32 behavioral2/memory/1748-131-0x0000000000DF0000-0x0000000000E19000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe Token: SeTcbPrivilege 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1292 c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879.exe 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1312 1292 c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879.exe 95 PID 1292 wrote to memory of 1312 1292 c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879.exe 95 PID 1292 wrote to memory of 1312 1292 c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879.exe 95 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1312 wrote to memory of 2244 1312 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 98 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1992 wrote to memory of 1124 1992 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 114 PID 1748 wrote to memory of 2424 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 124 PID 1748 wrote to memory of 2424 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 124 PID 1748 wrote to memory of 2424 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 124 PID 1748 wrote to memory of 2424 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 124 PID 1748 wrote to memory of 2424 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 124 PID 1748 wrote to memory of 2424 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 124 PID 1748 wrote to memory of 2424 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 124 PID 1748 wrote to memory of 2424 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 124 PID 1748 wrote to memory of 2424 1748 c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879.exe"C:\Users\Admin\AppData\Local\Temp\c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Roaming\WinSocket\c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exeC:\Users\Admin\AppData\Roaming\WinSocket\c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2244
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2320,i,3025503729105798828,9325691672526736153,262144 --variations-seed-version /prefetch:81⤵PID:4576
-
C:\Users\Admin\AppData\Roaming\WinSocket\c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exeC:\Users\Admin\AppData\Roaming\WinSocket\c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1124
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exeC:\Users\Admin\AppData\Roaming\WinSocket\c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\c3999298bfa27419b0eb41a431e11a77cdf42b077e942942ba934010de97d989.exe
Filesize1.3MB
MD5665caf9715e0387a6d145da916939414
SHA172f1aa8bece1f7548db284fadf87fafcc2baf60f
SHA256c3899287bfa26419b0eb41a431e11a66cdf42b066e942942ba834010de86d879
SHA512e47ba3f758ae0509272937ec79e30fdc367025a479ed0e28bda986cf7ed938cf9f10180c0d589cb0033b7c906a9cdfba54a91cdde18076ab4809b1deb27709f0
-
Filesize
61KB
MD5f3ec862ace04647c5eace07538cc1172
SHA14fca667675c3f06d29b66386fe0988056c3a13f1
SHA256377ce9c07db3324225f6bf7165fbbe5c100535bb08eb9dd8cf042198694abb35
SHA512b3214953f93cf5acbc77673a944e78739d46b6db5f05c2a5df62d5a6ca4fe07bb1ba00ba27f24be0c20da56a3270a2af4f44e69d55d1bc3269f221bff04716e0