Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 14:58
Behavioral task
behavioral1
Sample
c011bc697c0a3021df30f9298f8527f0_NEAS.exe
Resource
win7-20240419-en
General
-
Target
c011bc697c0a3021df30f9298f8527f0_NEAS.exe
-
Size
1.2MB
-
MD5
c011bc697c0a3021df30f9298f8527f0
-
SHA1
59e7eb7ba71e441682cd9026b256e2cb98259f4a
-
SHA256
3e98a91eacd216be297e5fd0c969c88b5f6cc182dacf852bb63a1d2513652537
-
SHA512
76ff464100b3f762e02d8056d879faf0463b1a64e982fb6aad486112204f207bc381d51d1bd4439d485e952f87738a73b665f6d8057f057e67d4088cf79b4f17
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOxA5zYlQvmp8RxAb5J6iHsl5TM:E5aIwC+Agr6StVEnmcKxYDvZThTM
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000800000002325c-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3248-17-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 3020 c011bc798c0a3021df30f9299f9628f0_NFAS.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3248 c011bc697c0a3021df30f9298f8527f0_NEAS.exe 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 3248 wrote to memory of 3824 3248 c011bc697c0a3021df30f9298f8527f0_NEAS.exe 91 PID 3248 wrote to memory of 3824 3248 c011bc697c0a3021df30f9298f8527f0_NEAS.exe 91 PID 3248 wrote to memory of 3824 3248 c011bc697c0a3021df30f9298f8527f0_NEAS.exe 91 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 3824 wrote to memory of 1460 3824 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 92 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 PID 844 wrote to memory of 720 844 c011bc798c0a3021df30f9299f9628f0_NFAS.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c011bc697c0a3021df30f9298f8527f0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\c011bc697c0a3021df30f9298f8527f0_NEAS.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Roaming\WinSocket\c011bc798c0a3021df30f9299f9628f0_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\c011bc798c0a3021df30f9299f9628f0_NFAS.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1460
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:4736
-
C:\Users\Admin\AppData\Roaming\WinSocket\c011bc798c0a3021df30f9299f9628f0_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\c011bc798c0a3021df30f9299f9628f0_NFAS.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:720
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c011bc798c0a3021df30f9299f9628f0_NFAS.exeC:\Users\Admin\AppData\Roaming\WinSocket\c011bc798c0a3021df30f9299f9628f0_NFAS.exe1⤵
- Executes dropped EXE
PID:3020 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c011bc697c0a3021df30f9298f8527f0
SHA159e7eb7ba71e441682cd9026b256e2cb98259f4a
SHA2563e98a91eacd216be297e5fd0c969c88b5f6cc182dacf852bb63a1d2513652537
SHA51276ff464100b3f762e02d8056d879faf0463b1a64e982fb6aad486112204f207bc381d51d1bd4439d485e952f87738a73b665f6d8057f057e67d4088cf79b4f17
-
Filesize
47KB
MD5bf568342179d8a4257945462bcca389d
SHA1c2f12c5158f60be2361b1ac00b0c9eadbecc01ed
SHA2568bb6612d4bc161cfb44b8fb593da691cb8caf16d39ee940654c0bcc32abc853e
SHA5123d713395bc6d919d2c0fdee61791d408e96c03c3837e141e2a36d4dc8524ee431102c459e5cac3244b7992f60891f1b251b6c0ea099ffd548c8b93714b4c1223
-
Filesize
29KB
MD5bd132f30dded3644f31c90be15bf5ad1
SHA101638df33626df5e494bf81eb94fbee4486018de
SHA256f0ff3de2782208c34873e75a41937ad5f09fe8847c2e889a37e11f72002c4d78
SHA51235c5ce5f73fdcc76b6729196976fc0f7cb16b5e3a7943f0d0423adb6587af50d5fbf5d47bcdefd487a8a3f08bcd01e409ae198aac16a62a0a1120d2b364aecf4