Analysis
-
max time kernel
139s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 23:30
Behavioral task
behavioral1
Sample
6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe
Resource
win7-20240221-en
General
-
Target
6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe
-
Size
1.1MB
-
MD5
9ece3b3514daec13578769d51b678b72
-
SHA1
e3c584bc02d2a413176baafd5534181d477019ae
-
SHA256
6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579
-
SHA512
cd5664c8c4545b8e639272dc5256ed6053e0a755073d3fffcdf9c03db30256622816330ef8424b935c4fb36b90ed4dbe2fc4b293731d8fd6124b000a87aa959c
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUkhmZ9skmbyT:E5aIwC+Agr6SNbN
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3156-15-0x00000000021E0000-0x0000000002209000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exepid process 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exedescription pid process Token: SeTcbPrivilege 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe Token: SeTcbPrivilege 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exepid process 3156 6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exedescription pid process target process PID 3156 wrote to memory of 3076 3156 6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe PID 3156 wrote to memory of 3076 3156 6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe PID 3156 wrote to memory of 3076 3156 6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 3076 wrote to memory of 2012 3076 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 2504 wrote to memory of 4172 2504 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 1272 wrote to memory of 3804 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 1272 wrote to memory of 3804 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 1272 wrote to memory of 3804 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 1272 wrote to memory of 3804 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 1272 wrote to memory of 3804 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 1272 wrote to memory of 3804 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 1272 wrote to memory of 3804 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 1272 wrote to memory of 3804 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe PID 1272 wrote to memory of 3804 1272 7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe"C:\Users\Admin\AppData\Local\Temp\6d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Roaming\WinSocket\7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exeC:\Users\Admin\AppData\Roaming\WinSocket\7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2012
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exeC:\Users\Admin\AppData\Roaming\WinSocket\7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4172
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exeC:\Users\Admin\AppData\Roaming\WinSocket\7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\7d747cc4e2940489811dad73296e2b7c8c4411c22d871e9fa321897ad611a689.exe
Filesize1.1MB
MD59ece3b3514daec13578769d51b678b72
SHA1e3c584bc02d2a413176baafd5534181d477019ae
SHA2566d646cc4e2840478711dad63295e2b6c7c4411c22d761e9fa321786ad511a579
SHA512cd5664c8c4545b8e639272dc5256ed6053e0a755073d3fffcdf9c03db30256622816330ef8424b935c4fb36b90ed4dbe2fc4b293731d8fd6124b000a87aa959c
-
Filesize
32KB
MD5fa1e2bfcabff74949e393d0ae794ae1f
SHA1026fe0a0a48e2ab3e57580db99105df4af5da4f8
SHA256a481e7bf381e9ad13c94a3a45d301ef12e8c5050608ebf583325955bdc439371
SHA512e3d914b7bae921b670d9894a5b614a067a653d555cae0cabd83203d8b0cd615d7ab946ce172fc364f9f0f6b0f257506baf6750a4cc9689168b6fa975815e30f1