Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 06:32
Behavioral task
behavioral1
Sample
82b1fccb2191c5faae77e6403f21a5b0_NEAS.exe
Resource
win7-20240221-en
General
-
Target
82b1fccb2191c5faae77e6403f21a5b0_NEAS.exe
-
Size
1.1MB
-
MD5
82b1fccb2191c5faae77e6403f21a5b0
-
SHA1
a1d51363ab9462bce510f9b38d9fc32926ebea43
-
SHA256
8a08748f0731289cfc9e3adca8f90829f17f774ef505fbd82ffa55a3dc6d6436
-
SHA512
3f40b4b1b0123e98c47c4e1315048de0350293eae2be67eb303b995b29f6f396f66062cb070a606ce81b04d6f4c1243066b8f1036e6acf1a85f6b97fddbb94cd
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOxA5zYlo1c51Wn7K:E5aIwC+Agr6StVEnmcKxY/O16K
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b8a-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2908-15-0x0000000002FE0000-0x0000000003009000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe Token: SeTcbPrivilege 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2908 82b1fccb2191c5faae77e6403f21a5b0_NEAS.exe 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3852 2908 82b1fccb2191c5faae77e6403f21a5b0_NEAS.exe 85 PID 2908 wrote to memory of 3852 2908 82b1fccb2191c5faae77e6403f21a5b0_NEAS.exe 85 PID 2908 wrote to memory of 3852 2908 82b1fccb2191c5faae77e6403f21a5b0_NEAS.exe 85 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3852 wrote to memory of 640 3852 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 86 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 3184 wrote to memory of 3484 3184 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 104 PID 2692 wrote to memory of 4784 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 115 PID 2692 wrote to memory of 4784 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 115 PID 2692 wrote to memory of 4784 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 115 PID 2692 wrote to memory of 4784 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 115 PID 2692 wrote to memory of 4784 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 115 PID 2692 wrote to memory of 4784 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 115 PID 2692 wrote to memory of 4784 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 115 PID 2692 wrote to memory of 4784 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 115 PID 2692 wrote to memory of 4784 2692 92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\82b1fccb2191c5faae77e6403f21a5b0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\82b1fccb2191c5faae77e6403f21a5b0_NEAS.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Roaming\WinSocket\92b1fccb2191c6faae88e7403f21a6b0_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:640
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\92b1fccb2191c6faae88e7403f21a6b0_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3484
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\92b1fccb2191c6faae88e7403f21a6b0_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\92b1fccb2191c6faae88e7403f21a6b0_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD582b1fccb2191c5faae77e6403f21a5b0
SHA1a1d51363ab9462bce510f9b38d9fc32926ebea43
SHA2568a08748f0731289cfc9e3adca8f90829f17f774ef505fbd82ffa55a3dc6d6436
SHA5123f40b4b1b0123e98c47c4e1315048de0350293eae2be67eb303b995b29f6f396f66062cb070a606ce81b04d6f4c1243066b8f1036e6acf1a85f6b97fddbb94cd
-
Filesize
36KB
MD599dff1752a0d242cd52def1ff92dbcd6
SHA1e0be5f1f7edb17fee084c6483121b376e23ceb8d
SHA256f4dbdeffcb2070137fe234e22ec82b9f377b1066d5bd1b7c344e49c718f3961d
SHA5123a6ec9fbdfb01d96b74cf5fb1dd1da13525c68c6a264a229f3b75e3685f115c5f169d8c9cf6d5268976d216ea83d2b4a68c3087402007bf24aec28b9c22fd32f