Analysis
-
max time kernel
137s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 03:34
Behavioral task
behavioral1
Sample
b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf.exe
Resource
win7-20240220-en
General
-
Target
b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf.exe
-
Size
1.3MB
-
MD5
39bc32190952310708a7fe023e985ec5
-
SHA1
347066cc8105f3c1a602962a931ced30e7a80694
-
SHA256
b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf
-
SHA512
9295d725e06acb21e9445d61ee71404b0e8059862604dc819df1405e53567243cd0f3c67f47f809f9cbdebec0e03ddb7b19e8a24eca3c54773ec394c393771ea
-
SSDEEP
24576:zQ5aILMCfmAUjzX6gfU1pjwjbsXhmvZssrD+nRgnf4NvlOSMOR:E5aIwC+Agr6g81p1vsrNiv
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b99-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/316-15-0x0000000002D20000-0x0000000002D49000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe Token: SeTcbPrivilege 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 316 b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf.exe 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 316 wrote to memory of 3668 316 b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf.exe 84 PID 316 wrote to memory of 3668 316 b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf.exe 84 PID 316 wrote to memory of 3668 316 b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf.exe 84 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 3668 wrote to memory of 4576 3668 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 85 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 4504 wrote to memory of 3636 4504 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 103 PID 5096 wrote to memory of 2716 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 116 PID 5096 wrote to memory of 2716 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 116 PID 5096 wrote to memory of 2716 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 116 PID 5096 wrote to memory of 2716 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 116 PID 5096 wrote to memory of 2716 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 116 PID 5096 wrote to memory of 2716 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 116 PID 5096 wrote to memory of 2716 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 116 PID 5096 wrote to memory of 2716 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 116 PID 5096 wrote to memory of 2716 5096 b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf.exe"C:\Users\Admin\AppData\Local\Temp\b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Roaming\WinSocket\b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exeC:\Users\Admin\AppData\Roaming\WinSocket\b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4576
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exeC:\Users\Admin\AppData\Roaming\WinSocket\b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3636
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exeC:\Users\Admin\AppData\Roaming\WinSocket\b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\b99b31331d99770942f8244d7dd3e10007fcef8c81ad7ecaa91b7ef3d99698cf.exe
Filesize1.3MB
MD539bc32190952310708a7fe023e985ec5
SHA1347066cc8105f3c1a602962a931ced30e7a80694
SHA256b88b31331d88660942f7244d6dd3e10006fcef7c71ad6ecaa91b6ef3d98587cf
SHA5129295d725e06acb21e9445d61ee71404b0e8059862604dc819df1405e53567243cd0f3c67f47f809f9cbdebec0e03ddb7b19e8a24eca3c54773ec394c393771ea
-
Filesize
67KB
MD5b02147a9804bc7e092fe59893cbec655
SHA1333be9a3060db793cc4b9a0da0561d1c7927679d
SHA256e17761b66f8fb8428ac19f8c7aaed1ce49ee6111fa3c528ef68eae04dc89530e
SHA512617b16d3006b29d58342421c9d7de14f3efebcd980d5b443bbdc457758146ca159fe6ceb5168eeeb17734bef365c6f597b9f85840638339c6672bff0b6422fcc