Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 03:59
Behavioral task
behavioral1
Sample
614bf24801b45e4471544ea4abd51d00_NEAS.exe
Resource
win7-20240221-en
General
-
Target
614bf24801b45e4471544ea4abd51d00_NEAS.exe
-
Size
1.3MB
-
MD5
614bf24801b45e4471544ea4abd51d00
-
SHA1
3b88a131c3133294dfcaa53ce90f50121e0baf72
-
SHA256
b7967c41436768839f4078e3adacd28d69beabdcc8c159e7e8dc6c934b8f043b
-
SHA512
bec241b88d95d0b74fd5d823cac9f2df83b4c7bc482475c3dcb7b33b8516751edfccf384bede898b86f3cee4ef38c60caa0b1da8467e8f604e9e703afb63da18
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMc7qzz1IojVD0UOSQk:E5aIwC+Agr6twjVD3
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023bb7-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1360-15-0x0000000002AF0000-0x0000000002B19000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe Token: SeTcbPrivilege 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1360 614bf24801b45e4471544ea4abd51d00_NEAS.exe 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1652 1360 614bf24801b45e4471544ea4abd51d00_NEAS.exe 85 PID 1360 wrote to memory of 1652 1360 614bf24801b45e4471544ea4abd51d00_NEAS.exe 85 PID 1360 wrote to memory of 1652 1360 614bf24801b45e4471544ea4abd51d00_NEAS.exe 85 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 1652 wrote to memory of 3748 1652 714bf24901b46e4481644ea4abd61d00_NFAS.exe 86 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 892 wrote to memory of 4700 892 714bf24901b46e4481644ea4abd61d00_NFAS.exe 103 PID 796 wrote to memory of 1360 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe 115 PID 796 wrote to memory of 1360 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe 115 PID 796 wrote to memory of 1360 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe 115 PID 796 wrote to memory of 1360 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe 115 PID 796 wrote to memory of 1360 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe 115 PID 796 wrote to memory of 1360 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe 115 PID 796 wrote to memory of 1360 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe 115 PID 796 wrote to memory of 1360 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe 115 PID 796 wrote to memory of 1360 796 714bf24901b46e4481644ea4abd61d00_NFAS.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\614bf24801b45e4471544ea4abd51d00_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\614bf24801b45e4471544ea4abd51d00_NEAS.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Roaming\WinSocket\714bf24901b46e4481644ea4abd61d00_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\714bf24901b46e4481644ea4abd61d00_NFAS.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3748
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\714bf24901b46e4481644ea4abd61d00_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\714bf24901b46e4481644ea4abd61d00_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4700
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\714bf24901b46e4481644ea4abd61d00_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\714bf24901b46e4481644ea4abd61d00_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5614bf24801b45e4471544ea4abd51d00
SHA13b88a131c3133294dfcaa53ce90f50121e0baf72
SHA256b7967c41436768839f4078e3adacd28d69beabdcc8c159e7e8dc6c934b8f043b
SHA512bec241b88d95d0b74fd5d823cac9f2df83b4c7bc482475c3dcb7b33b8516751edfccf384bede898b86f3cee4ef38c60caa0b1da8467e8f604e9e703afb63da18
-
Filesize
47KB
MD59adc01e18ed79e9872eb0b6f7ada00e1
SHA10bc8ab77c60b599805e1e1a5c9cad57d434c3e4c
SHA256fa2c601c8d8d0ae03dce073869436e1680989df33154201d5680a2b9152e1c51
SHA5124ee567c5a528b907bd2f84b283c12095d4803789d1431e7c3ade14aba96b0f745eab42274bbb7e117d506cdb4168b70ec2f72a67c323e9561ce3291360a0003b