Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 11:50
Behavioral task
behavioral1
Sample
63dd50459022417355a344051addbb40_NEAS.exe
Resource
win7-20240215-en
General
-
Target
63dd50459022417355a344051addbb40_NEAS.exe
-
Size
926KB
-
MD5
63dd50459022417355a344051addbb40
-
SHA1
0c63375768c07404e70aa5af77061d6cc2f4b901
-
SHA256
b9099e6b5cb7a631aef9551575a83e5f5b7bf5121bdd76ee7f96c50155e63753
-
SHA512
135710986db626bdf75834ff9779d130d59f63d5afb6df7e45addc6d321154a57176d8a526ff314779c531660e556ab1de50c943392689a7a66943267cf92c08
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQNhW4L+OR9a:zQ5aILMCfmAUjzX6xQtjmsNLRu
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023bb6-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1040-15-0x00000000021D0000-0x00000000021F9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2100 73dd60469022418366a344061addbb40_NFAS.exe 1332 73dd60469022418366a344061addbb40_NFAS.exe 4232 73dd60469022418366a344061addbb40_NFAS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1332 73dd60469022418366a344061addbb40_NFAS.exe Token: SeTcbPrivilege 4232 73dd60469022418366a344061addbb40_NFAS.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1040 63dd50459022417355a344051addbb40_NEAS.exe 2100 73dd60469022418366a344061addbb40_NFAS.exe 1332 73dd60469022418366a344061addbb40_NFAS.exe 4232 73dd60469022418366a344061addbb40_NFAS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2100 1040 63dd50459022417355a344051addbb40_NEAS.exe 83 PID 1040 wrote to memory of 2100 1040 63dd50459022417355a344051addbb40_NEAS.exe 83 PID 1040 wrote to memory of 2100 1040 63dd50459022417355a344051addbb40_NEAS.exe 83 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 2100 wrote to memory of 1224 2100 73dd60469022418366a344061addbb40_NFAS.exe 84 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 1332 wrote to memory of 4804 1332 73dd60469022418366a344061addbb40_NFAS.exe 106 PID 4232 wrote to memory of 2728 4232 73dd60469022418366a344061addbb40_NFAS.exe 115 PID 4232 wrote to memory of 2728 4232 73dd60469022418366a344061addbb40_NFAS.exe 115 PID 4232 wrote to memory of 2728 4232 73dd60469022418366a344061addbb40_NFAS.exe 115 PID 4232 wrote to memory of 2728 4232 73dd60469022418366a344061addbb40_NFAS.exe 115 PID 4232 wrote to memory of 2728 4232 73dd60469022418366a344061addbb40_NFAS.exe 115 PID 4232 wrote to memory of 2728 4232 73dd60469022418366a344061addbb40_NFAS.exe 115 PID 4232 wrote to memory of 2728 4232 73dd60469022418366a344061addbb40_NFAS.exe 115 PID 4232 wrote to memory of 2728 4232 73dd60469022418366a344061addbb40_NFAS.exe 115 PID 4232 wrote to memory of 2728 4232 73dd60469022418366a344061addbb40_NFAS.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\63dd50459022417355a344051addbb40_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\63dd50459022417355a344051addbb40_NEAS.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Roaming\WinSocket\73dd60469022418366a344061addbb40_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\73dd60469022418366a344061addbb40_NFAS.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1224
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\73dd60469022418366a344061addbb40_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\73dd60469022418366a344061addbb40_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4804
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\73dd60469022418366a344061addbb40_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\73dd60469022418366a344061addbb40_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
926KB
MD563dd50459022417355a344051addbb40
SHA10c63375768c07404e70aa5af77061d6cc2f4b901
SHA256b9099e6b5cb7a631aef9551575a83e5f5b7bf5121bdd76ee7f96c50155e63753
SHA512135710986db626bdf75834ff9779d130d59f63d5afb6df7e45addc6d321154a57176d8a526ff314779c531660e556ab1de50c943392689a7a66943267cf92c08
-
Filesize
15KB
MD567dab9d70f35abc50082c7286f06ef8a
SHA1e33c8d3d04a9bde4628b4f3bf29577efa7125f3a
SHA256e80ab5d869313f37b91a758928cd5531b6a4d370f14cedf5cadbdcecc7687709
SHA5127fe478255159ba0d93a5e149b0d750e37cd1e45a0816a1c8f149224ae1d47182c8c1da66866abacf70d4f8301e608a37f557b8cb1174aa55f07e8e60d164433b