Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 19:16
Behavioral task
behavioral1
Sample
1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe
Resource
win7-20240508-en
General
-
Target
1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe
-
Size
943KB
-
MD5
665b8cace4e7b61cd55c5d338826bb11
-
SHA1
9e23d18298cbbf523ca764fc2c1c7ebe335f05a4
-
SHA256
1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298
-
SHA512
6b424d4c9a4f24bf6966c38e4859d963e664fe7e2b54594c254572dd1fcd1ef497bcd1baf8f37cb52de89af327109d749dedd2c3408526b8a3bf56b995a28e66
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUkhmZ1:E5aIwC+Agr6SNbz
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2080-15-0x0000000002150000-0x0000000002179000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exepid process 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exedescription pid process Token: SeTcbPrivilege 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe Token: SeTcbPrivilege 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exepid process 2080 1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exedescription pid process target process PID 2080 wrote to memory of 872 2080 1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe PID 2080 wrote to memory of 872 2080 1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe PID 2080 wrote to memory of 872 2080 1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 872 wrote to memory of 2660 872 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 3440 wrote to memory of 1220 3440 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 4380 wrote to memory of 636 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 4380 wrote to memory of 636 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 4380 wrote to memory of 636 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 4380 wrote to memory of 636 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 4380 wrote to memory of 636 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 4380 wrote to memory of 636 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 4380 wrote to memory of 636 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 4380 wrote to memory of 636 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe PID 4380 wrote to memory of 636 4380 1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe"C:\Users\Admin\AppData\Local\Temp\1a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Roaming\WinSocket\1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exeC:\Users\Admin\AppData\Roaming\WinSocket\1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2660
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exeC:\Users\Admin\AppData\Roaming\WinSocket\1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1220
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exeC:\Users\Admin\AppData\Roaming\WinSocket\1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\1a27b29b198cc42a20192994a76b6640941997bc9a27c96f74192018973ad299.exe
Filesize943KB
MD5665b8cace4e7b61cd55c5d338826bb11
SHA19e23d18298cbbf523ca764fc2c1c7ebe335f05a4
SHA2561a26b29b187cc42a20182884a65b5540841896bc8a26c85f64192017963ad298
SHA5126b424d4c9a4f24bf6966c38e4859d963e664fe7e2b54594c254572dd1fcd1ef497bcd1baf8f37cb52de89af327109d749dedd2c3408526b8a3bf56b995a28e66
-
Filesize
29KB
MD51f68ff5bd0d77fb275380201b9d1505c
SHA13ad0de09100495f40ac1272b8b89ca16affea8d9
SHA256e160e15b0e5c6430b8a252605282f8c0e96ac9c8201e962b9c10e0042bdc7e1b
SHA512c1b0ed1a2c44d5971ab9a7028452e94dac1e6c5887469654396c21178ab01dc2954128f5280072b4855eea03ea70f2550c8f04b997cadefd5acbbe0df2663b76