Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 23:40
Behavioral task
behavioral1
Sample
32f75ff62b7b3b61511d05a4cff972b0_NEAS.exe
Resource
win7-20240215-en
General
-
Target
32f75ff62b7b3b61511d05a4cff972b0_NEAS.exe
-
Size
1.2MB
-
MD5
32f75ff62b7b3b61511d05a4cff972b0
-
SHA1
6622cec40fa950c7875971257594122d436838ac
-
SHA256
230c75bc525b6ee25ca17be2d1630b361983f1a10e15b33f782ca3cfb983df38
-
SHA512
90fcbd11aabd987cec243355ba2d99bb228be844f8fda8d3088aac89d781ec28ab4ecf215ee26644120453ba9a24c4caea6300118a9cb453d8403ea51e3fc896
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sdr36OTcgapChI/W:E5aIwC+Agr6S/FEVN
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023bb6-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4848-15-0x0000000002FE0000-0x0000000003009000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe Token: SeTcbPrivilege 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4848 32f75ff62b7b3b61511d05a4cff972b0_NEAS.exe 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 3572 4848 32f75ff62b7b3b61511d05a4cff972b0_NEAS.exe 84 PID 4848 wrote to memory of 3572 4848 32f75ff62b7b3b61511d05a4cff972b0_NEAS.exe 84 PID 4848 wrote to memory of 3572 4848 32f75ff62b7b3b61511d05a4cff972b0_NEAS.exe 84 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3572 wrote to memory of 8 3572 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 85 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 3164 wrote to memory of 860 3164 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 102 PID 4232 wrote to memory of 1140 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 116 PID 4232 wrote to memory of 1140 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 116 PID 4232 wrote to memory of 1140 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 116 PID 4232 wrote to memory of 1140 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 116 PID 4232 wrote to memory of 1140 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 116 PID 4232 wrote to memory of 1140 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 116 PID 4232 wrote to memory of 1140 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 116 PID 4232 wrote to memory of 1140 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 116 PID 4232 wrote to memory of 1140 4232 32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\32f75ff62b7b3b61511d05a4cff972b0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\32f75ff62b7b3b61511d05a4cff972b0_NEAS.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Roaming\WinSocket\32f86ff72b8b3b71611d06a4cff982b0_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:8
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\32f86ff72b8b3b71611d06a4cff982b0_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:860
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\32f86ff72b8b3b71611d06a4cff982b0_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\32f86ff72b8b3b71611d06a4cff982b0_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD532f75ff62b7b3b61511d05a4cff972b0
SHA16622cec40fa950c7875971257594122d436838ac
SHA256230c75bc525b6ee25ca17be2d1630b361983f1a10e15b33f782ca3cfb983df38
SHA51290fcbd11aabd987cec243355ba2d99bb228be844f8fda8d3088aac89d781ec28ab4ecf215ee26644120453ba9a24c4caea6300118a9cb453d8403ea51e3fc896
-
Filesize
55KB
MD5ad0b997309fd30253a0119a6c3db769b
SHA1838da84711562998af3038ac796d156ed2c3c998
SHA2567a07cada03846ed56f6b104d8ca7e7ba8c9acbe566bf680d44448e245348311f
SHA512d0ab10e86e3a300449c1b6e7ea900977061b5b4e76059bd284031d50a731ce7bc55898dd06e053108bcd4d26b08048f3c4ed132b61b027dc368fb4fb7a1db681