Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 02:07
Behavioral task
behavioral1
Sample
a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba.exe
Resource
win7-20240419-en
General
-
Target
a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba.exe
-
Size
1.4MB
-
MD5
49465351d0cf6f378feefa619276a838
-
SHA1
9aaa851e592a480309cace5b307285c4c3ceddac
-
SHA256
a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba
-
SHA512
771695808f9c7d8c4af317889274f7dab1becca3f5bebd387cc49026b3893a8e32005c2ae43414108187e944115aa45999d1ce4ca0f9a442a1219a269229ccf2
-
SSDEEP
24576:zQ5aILMCfmAUjzX6gfU1pjwjbsXhmvZssrD+nRgnf4NvlOrt0JA01Mkc5lkTP:E5aIwC+Agr6g81p1vsrNio0m/lK
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023412-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4356-15-0x0000000002AC0000-0x0000000002AE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe Token: SeTcbPrivilege 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4356 a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba.exe 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4356 wrote to memory of 5044 4356 a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba.exe 82 PID 4356 wrote to memory of 5044 4356 a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba.exe 82 PID 4356 wrote to memory of 5044 4356 a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba.exe 82 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 5044 wrote to memory of 4804 5044 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 84 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 4504 wrote to memory of 1716 4504 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 87 PID 408 wrote to memory of 3936 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 89 PID 408 wrote to memory of 3936 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 89 PID 408 wrote to memory of 3936 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 89 PID 408 wrote to memory of 3936 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 89 PID 408 wrote to memory of 3936 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 89 PID 408 wrote to memory of 3936 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 89 PID 408 wrote to memory of 3936 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 89 PID 408 wrote to memory of 3936 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 89 PID 408 wrote to memory of 3936 408 a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba.exe"C:\Users\Admin\AppData\Local\Temp\a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Roaming\WinSocket\a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exeC:\Users\Admin\AppData\Roaming\WinSocket\a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4804
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exeC:\Users\Admin\AppData\Roaming\WinSocket\a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1716
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exeC:\Users\Admin\AppData\Roaming\WinSocket\a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\a1067b12632d917f1ecc71fc7aeadcc3eadc99410e2cbf38ce9fd29f7cbe66ba.exe
Filesize1.4MB
MD549465351d0cf6f378feefa619276a838
SHA19aaa851e592a480309cace5b307285c4c3ceddac
SHA256a1056b12532d816f1ecc61fc6aeadcc3eadc88410e2cbf37ce8fd29f6cbe55ba
SHA512771695808f9c7d8c4af317889274f7dab1becca3f5bebd387cc49026b3893a8e32005c2ae43414108187e944115aa45999d1ce4ca0f9a442a1219a269229ccf2
-
Filesize
36KB
MD5e0219e4bfeb27c8f1d42cfdd44d3792a
SHA1c6edf24070988ecfaf71059f49436a6958b6c0c5
SHA25695a3be7063439247116377f11fbb479d901185b53d68fd2e23f2ad1cf38183dd
SHA51227b8b8effde46192291f76772bfb1fb7bff22630895bcd8729023596a7754162e5f8e99b6c267f3d921a4984d450fc0ebc92e7d5c6634e1bb37d9fd5e941fd02