Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 00:41
Behavioral task
behavioral1
Sample
a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7.exe
Resource
win7-20240419-en
General
-
Target
a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7.exe
-
Size
858KB
-
MD5
be0e619026ab61ce6f26cfac1662abe5
-
SHA1
c62908e7042a7c1ccd63d3c14924e6231e983e69
-
SHA256
a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7
-
SHA512
453b6478100234d470e1c9cd340424482d31e7aba931494a044278160efb48017983d3982b64100f7c6ae462f5f01136f3b80cc39dea32b66aff0f1d0e746fb3
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSs9U3NL9WEEoLPw9IWPzX:zQ5aILMCfmAUjzX6xQt9U3917LwpP7
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b92-22.dat family_kpot -
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4000-15-0x0000000002320000-0x0000000002349000-memory.dmp trickbot_loader32 behavioral2/memory/4000-19-0x0000000002320000-0x0000000002349000-memory.dmp trickbot_loader32 behavioral2/memory/4000-23-0x0000000002320000-0x0000000002349000-memory.dmp trickbot_loader32 behavioral2/memory/3888-44-0x00000000020F0000-0x0000000002119000-memory.dmp trickbot_loader32 behavioral2/memory/3888-59-0x00000000020F0000-0x0000000002119000-memory.dmp trickbot_loader32 behavioral2/memory/5096-80-0x0000000000DD0000-0x0000000000DF9000-memory.dmp trickbot_loader32 behavioral2/memory/5096-94-0x0000000000DD0000-0x0000000000DF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe Token: SeTcbPrivilege 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4000 a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7.exe 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 3888 4000 a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7.exe 87 PID 4000 wrote to memory of 3888 4000 a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7.exe 87 PID 4000 wrote to memory of 3888 4000 a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7.exe 87 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 3888 wrote to memory of 648 3888 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 89 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 5096 wrote to memory of 2516 5096 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 99 PID 916 wrote to memory of 1956 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 103 PID 916 wrote to memory of 1956 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 103 PID 916 wrote to memory of 1956 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 103 PID 916 wrote to memory of 1956 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 103 PID 916 wrote to memory of 1956 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 103 PID 916 wrote to memory of 1956 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 103 PID 916 wrote to memory of 1956 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 103 PID 916 wrote to memory of 1956 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 103 PID 916 wrote to memory of 1956 916 a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7.exe"C:\Users\Admin\AppData\Local\Temp\a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Roaming\WinSocket\a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exeC:\Users\Admin\AppData\Roaming\WinSocket\a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:648
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exeC:\Users\Admin\AppData\Roaming\WinSocket\a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2516
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exeC:\Users\Admin\AppData\Roaming\WinSocket\a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\a497d2a0b7b71b32aa9c2767cf3bc41f4e62e9a9e42d1acc3d4ded7899d8bed8.exe
Filesize858KB
MD5be0e619026ab61ce6f26cfac1662abe5
SHA1c62908e7042a7c1ccd63d3c14924e6231e983e69
SHA256a486d2a0b6b61b32aa9c2656cf3bc41f4e52e8a9e42d1acc3d4ded6799d7bed7
SHA512453b6478100234d470e1c9cd340424482d31e7aba931494a044278160efb48017983d3982b64100f7c6ae462f5f01136f3b80cc39dea32b66aff0f1d0e746fb3
-
Filesize
48KB
MD550de99d298e52315dca0182ea4a42112
SHA1c8c86d9381f4d375393a026a2486ac9d73d3b4a4
SHA2565bda48a3f7cd7025684aaa6be3cf1e35b7cce9417913c0294a34832c0aadbc24
SHA512840186703317e39e583b04aa3bd7c5e93e5e4be6d793ddfdb4db43b6c3f2b4fa608ffaf420ebff098a21cf6048bbf019e57faede9234c135ae35fdfdb36ef5d1