Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 00:00
Behavioral task
behavioral1
Sample
915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b.exe
Resource
win7-20240508-en
General
-
Target
915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b.exe
-
Size
1.3MB
-
MD5
4722b41cda23cc52e749283e50991ce3
-
SHA1
f96ee335604b6ebecf4d36831a03c65d8fab258a
-
SHA256
915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b
-
SHA512
d9fc42a4f95cc87f352f1e5e5ccf3cc844799ce82f3b0706f6d4f137a2888ada7a11af51c8fc9e2e3e5be682d2baabd3dc255e812477bea53a26d5f664499215
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMc7qzz1IojVD0nb2:E5aIwC+Agr6twjVDOb2
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023406-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4836-15-0x00000000021F0000-0x0000000002219000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe Token: SeTcbPrivilege 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4836 915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b.exe 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 1388 4836 915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b.exe 85 PID 4836 wrote to memory of 1388 4836 915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b.exe 85 PID 4836 wrote to memory of 1388 4836 915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b.exe 85 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 1388 wrote to memory of 4196 1388 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 86 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 3060 wrote to memory of 3588 3060 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 93 PID 920 wrote to memory of 3384 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 95 PID 920 wrote to memory of 3384 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 95 PID 920 wrote to memory of 3384 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 95 PID 920 wrote to memory of 3384 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 95 PID 920 wrote to memory of 3384 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 95 PID 920 wrote to memory of 3384 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 95 PID 920 wrote to memory of 3384 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 95 PID 920 wrote to memory of 3384 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 95 PID 920 wrote to memory of 3384 920 916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b.exe"C:\Users\Admin\AppData\Local\Temp\915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Roaming\WinSocket\916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exeC:\Users\Admin\AppData\Roaming\WinSocket\916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4196
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exeC:\Users\Admin\AppData\Roaming\WinSocket\916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3588
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exeC:\Users\Admin\AppData\Roaming\WinSocket\916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\916ad7cccdf11303d69cc7990cc97a12614a667f021991ce1fca627bf323c88b.exe
Filesize1.3MB
MD54722b41cda23cc52e749283e50991ce3
SHA1f96ee335604b6ebecf4d36831a03c65d8fab258a
SHA256915ad6cccdf11303d59cc6890cc86a12514a556f021981ce1fca526bf323c77b
SHA512d9fc42a4f95cc87f352f1e5e5ccf3cc844799ce82f3b0706f6d4f137a2888ada7a11af51c8fc9e2e3e5be682d2baabd3dc255e812477bea53a26d5f664499215
-
Filesize
63KB
MD59db0d100e67757205cb3ceb438b408e6
SHA1adf8d46299320419dd2eb0c6a5f1397fe2a37361
SHA25630d0a119611e9ba19d210a1aeeeea4b05a9d35d72d1c11c826dd774aef2bf478
SHA5129ff5839c57cd8ff0cf1a96ef026eee82938db912aff52ac566df21b5c82b32fe17dfece8abdaf4a104ed091cafce3004158560cd7e051bb2a3790a83ed1adbaa