Analysis
-
max time kernel
138s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 03:45
Behavioral task
behavioral1
Sample
c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exe
Resource
win7-20240215-en
General
-
Target
c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exe
-
Size
1.3MB
-
MD5
76ce9f9efe56916ee67ea74537049745
-
SHA1
cb081b925520460c304044d143ca8ed761a47455
-
SHA256
c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f
-
SHA512
2517bd3065ed70ba26cf15b91df5b8a6829f5aff5304fadd7f9637d9ef88898730e7a8dfb8c114849c0796ead8dde162d670f52afe1e01fff11181e8fd33d093
-
SSDEEP
24576:zQ5aILMCfmAUjzX6gfU1pjwjbsXhmvZssrD+nRgnf4NvlOrt0JA01Mkc513D:E5aIwC+Agr6g81p1vsrNio0m/N
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1340-15-0x0000000002300000-0x0000000002329000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exec66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exec66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exepid process 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exec66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exedescription pid process Token: SeTcbPrivilege 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe Token: SeTcbPrivilege 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exec66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exec66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exec66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exepid process 1340 c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exe 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exec66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exec66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exec66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exedescription pid process target process PID 1340 wrote to memory of 4432 1340 c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exe c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe PID 1340 wrote to memory of 4432 1340 c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exe c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe PID 1340 wrote to memory of 4432 1340 c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exe c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 4432 wrote to memory of 4836 4432 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1704 wrote to memory of 2724 1704 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1676 wrote to memory of 2388 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1676 wrote to memory of 2388 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1676 wrote to memory of 2388 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1676 wrote to memory of 2388 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1676 wrote to memory of 2388 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1676 wrote to memory of 2388 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1676 wrote to memory of 2388 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1676 wrote to memory of 2388 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe PID 1676 wrote to memory of 2388 1676 c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exe"C:\Users\Admin\AppData\Local\Temp\c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Roaming\WinSocket\c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exeC:\Users\Admin\AppData\Roaming\WinSocket\c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4836
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exeC:\Users\Admin\AppData\Roaming\WinSocket\c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2724
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exeC:\Users\Admin\AppData\Roaming\WinSocket\c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\c66aefd21c9664370e099467ce23c9349eda63694f1fc990709e9b88b61d963f.exe
Filesize1.3MB
MD576ce9f9efe56916ee67ea74537049745
SHA1cb081b925520460c304044d143ca8ed761a47455
SHA256c55aefd21c8554360e099456ce23c9348eda53594f1fc890608e9b77b51d853f
SHA5122517bd3065ed70ba26cf15b91df5b8a6829f5aff5304fadd7f9637d9ef88898730e7a8dfb8c114849c0796ead8dde162d670f52afe1e01fff11181e8fd33d093
-
Filesize
37KB
MD5d6313f10303cf77185d1828f4d0c6b8a
SHA1cd3b5bca7f624e68f06a15a5cad4a88538dbbdb0
SHA256cf414475d66e9d878c82b7beb7f6baac531953de1ef60da6a8ae748b228811b4
SHA5128998f2c5588365a2073b6455598c97494fc776253ff066d9ab557d60fd2c104c0de09e9096ddabf52d74c86a5c46bd523f2adcea1b9a58509cfe855b11052376