Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 01:10
Behavioral task
behavioral1
Sample
42ff47a44853ed6aa9ff72648c9c4960_NEAS.exe
Resource
win7-20240221-en
General
-
Target
42ff47a44853ed6aa9ff72648c9c4960_NEAS.exe
-
Size
1.3MB
-
MD5
42ff47a44853ed6aa9ff72648c9c4960
-
SHA1
bc5ff578adb57d6632045b56deca62dabab39683
-
SHA256
da6aa9bb08e08447c305bee05c31500a0837bdfdcee7fdeae0148ba6481c0cae
-
SHA512
131231fa77781abcd8711ca3761a4510fcf52468fc9c6d59557fafc22b9382962e95b68b2b9b9008bb64094a4754b05df29af93a0e6fcd4334e325534815fa10
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOFZ+jJ/1q0GrbcUxnMj4:E5aIwC+Agr6StVEnmcKWnq0vlj4
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023bb7-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4180-15-0x0000000002AF0000-0x0000000002B19000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe Token: SeTcbPrivilege 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4180 42ff47a44853ed6aa9ff72648c9c4960_NEAS.exe 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 1804 4180 42ff47a44853ed6aa9ff72648c9c4960_NEAS.exe 84 PID 4180 wrote to memory of 1804 4180 42ff47a44853ed6aa9ff72648c9c4960_NEAS.exe 84 PID 4180 wrote to memory of 1804 4180 42ff47a44853ed6aa9ff72648c9c4960_NEAS.exe 84 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1804 wrote to memory of 4856 1804 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 85 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 1196 wrote to memory of 2420 1196 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 102 PID 2184 wrote to memory of 2312 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 116 PID 2184 wrote to memory of 2312 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 116 PID 2184 wrote to memory of 2312 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 116 PID 2184 wrote to memory of 2312 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 116 PID 2184 wrote to memory of 2312 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 116 PID 2184 wrote to memory of 2312 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 116 PID 2184 wrote to memory of 2312 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 116 PID 2184 wrote to memory of 2312 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 116 PID 2184 wrote to memory of 2312 2184 42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\42ff47a44853ed6aa9ff72648c9c4960_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\42ff47a44853ed6aa9ff72648c9c4960_NEAS.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Roaming\WinSocket\42ff48a44963ed7aa9ff82749c9c4970_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4856
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\42ff48a44963ed7aa9ff82749c9c4970_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2420
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\42ff48a44963ed7aa9ff82749c9c4970_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\42ff48a44963ed7aa9ff82749c9c4970_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD542ff47a44853ed6aa9ff72648c9c4960
SHA1bc5ff578adb57d6632045b56deca62dabab39683
SHA256da6aa9bb08e08447c305bee05c31500a0837bdfdcee7fdeae0148ba6481c0cae
SHA512131231fa77781abcd8711ca3761a4510fcf52468fc9c6d59557fafc22b9382962e95b68b2b9b9008bb64094a4754b05df29af93a0e6fcd4334e325534815fa10
-
Filesize
54KB
MD570a675e96eaa09b5bafc95d0005f3537
SHA1c212f22bf20e942116035a3aa7d12283e6265334
SHA256a5dfc0f9693b13e7946359c96c336d80ffb404113ea595cfac20206b53f3f629
SHA5124db843fdc5732d1f44343931d3cb0374c0dc1d8002318688af828322fdb1726e6502723b6bfef68fe4e831d8ca0a5066c4ed3795b3d93feb510be4d49b04bf8f