Analysis
-
max time kernel
138s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 09:35
Behavioral task
behavioral1
Sample
280df8175f9acb9219baef6b26693210_NEAS.exe
Resource
win7-20240419-en
General
-
Target
280df8175f9acb9219baef6b26693210_NEAS.exe
-
Size
1.2MB
-
MD5
280df8175f9acb9219baef6b26693210
-
SHA1
3510bf9dacd94065039ab3ecba55b24ce0e016f5
-
SHA256
2bbbbc59558516e2781b6187be3caa21b3daf34ea35cedcba41038d100f6cb80
-
SHA512
9efd5d51abbc7a5eddc6e76a607e246e1c8a277a47bdd1aec930e32babec8dc278bddb947c07684bdc20694f0a82f853a0de97f035894656e67bf6190a009fe9
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sdr36OTcgapChIv:E5aIwC+Agr6S/FEVe
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b82-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2704-16-0x00000000021F0000-0x0000000002219000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 5060 290df9186f9acb9219baef7b27793210_NFAS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3416 290df9186f9acb9219baef7b27793210_NFAS.exe Token: SeTcbPrivilege 5060 290df9186f9acb9219baef7b27793210_NFAS.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2704 280df8175f9acb9219baef6b26693210_NEAS.exe 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 5060 290df9186f9acb9219baef7b27793210_NFAS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2704 wrote to memory of 4052 2704 280df8175f9acb9219baef6b26693210_NEAS.exe 83 PID 2704 wrote to memory of 4052 2704 280df8175f9acb9219baef6b26693210_NEAS.exe 83 PID 2704 wrote to memory of 4052 2704 280df8175f9acb9219baef6b26693210_NEAS.exe 83 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 4052 wrote to memory of 3168 4052 290df9186f9acb9219baef7b27793210_NFAS.exe 84 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 3416 wrote to memory of 380 3416 290df9186f9acb9219baef7b27793210_NFAS.exe 100 PID 5060 wrote to memory of 396 5060 290df9186f9acb9219baef7b27793210_NFAS.exe 115 PID 5060 wrote to memory of 396 5060 290df9186f9acb9219baef7b27793210_NFAS.exe 115 PID 5060 wrote to memory of 396 5060 290df9186f9acb9219baef7b27793210_NFAS.exe 115 PID 5060 wrote to memory of 396 5060 290df9186f9acb9219baef7b27793210_NFAS.exe 115 PID 5060 wrote to memory of 396 5060 290df9186f9acb9219baef7b27793210_NFAS.exe 115 PID 5060 wrote to memory of 396 5060 290df9186f9acb9219baef7b27793210_NFAS.exe 115 PID 5060 wrote to memory of 396 5060 290df9186f9acb9219baef7b27793210_NFAS.exe 115 PID 5060 wrote to memory of 396 5060 290df9186f9acb9219baef7b27793210_NFAS.exe 115 PID 5060 wrote to memory of 396 5060 290df9186f9acb9219baef7b27793210_NFAS.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\280df8175f9acb9219baef6b26693210_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\280df8175f9acb9219baef6b26693210_NEAS.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\WinSocket\290df9186f9acb9219baef7b27793210_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\290df9186f9acb9219baef7b27793210_NFAS.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3168
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\290df9186f9acb9219baef7b27793210_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\290df9186f9acb9219baef7b27793210_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:380
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\290df9186f9acb9219baef7b27793210_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\290df9186f9acb9219baef7b27793210_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5280df8175f9acb9219baef6b26693210
SHA13510bf9dacd94065039ab3ecba55b24ce0e016f5
SHA2562bbbbc59558516e2781b6187be3caa21b3daf34ea35cedcba41038d100f6cb80
SHA5129efd5d51abbc7a5eddc6e76a607e246e1c8a277a47bdd1aec930e32babec8dc278bddb947c07684bdc20694f0a82f853a0de97f035894656e67bf6190a009fe9
-
Filesize
39KB
MD5df549cad1ee7041fb86dfc07a8d94f25
SHA171e74c8c42c0b3c481815caa361386963f4d2db0
SHA2562ab994eaaaa46dcd0bdc54bc09ff580190fbc805fd628326e8d6ccb4b86e08ef
SHA5124a143bccd682a5dc6bc7114f724eb91efd480028ba6449f73f90abc2ea3cd1487aabf63b5222f099197cd5b20ca7a1a348bbbfdd49724a5ed5ff97a6e64e4bc3