Analysis
-
max time kernel
136s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 19:29
Behavioral task
behavioral1
Sample
19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe
Resource
win7-20240508-en
General
-
Target
19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe
-
Size
1.4MB
-
MD5
53eb29f92fe9a89832da0be4b3dc52ed
-
SHA1
3170c4c2f8658fea9ffdfd0b449f1a833464a6e1
-
SHA256
19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537
-
SHA512
39236803ca6245d4416d0cf51e269b0d12d4286bd1df3f0ce696ff78e07f6b583092201584b201abdec01d9b7f749c0b846fd825a39c7449385c91c8a3c18c5a
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMcT/X2dI7T2FAoUcUOp6doF5ES/ojE2:E5aIwC+Agr6tdlmU1/eoo2
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3760-15-0x00000000023A0000-0x00000000023C9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exepid process 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exedescription pid process Token: SeTcbPrivilege 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe Token: SeTcbPrivilege 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exepid process 3760 19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exedescription pid process target process PID 3760 wrote to memory of 3972 3760 19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe PID 3760 wrote to memory of 3972 3760 19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe PID 3760 wrote to memory of 3972 3760 19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3972 wrote to memory of 916 3972 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 3948 wrote to memory of 632 3948 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 4180 wrote to memory of 2144 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 4180 wrote to memory of 2144 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 4180 wrote to memory of 2144 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 4180 wrote to memory of 2144 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 4180 wrote to memory of 2144 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 4180 wrote to memory of 2144 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 4180 wrote to memory of 2144 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 4180 wrote to memory of 2144 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe PID 4180 wrote to memory of 2144 4180 19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe"C:\Users\Admin\AppData\Local\Temp\19a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Roaming\WinSocket\19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exeC:\Users\Admin\AppData\Roaming\WinSocket\19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:916
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exeC:\Users\Admin\AppData\Roaming\WinSocket\19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:632
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exeC:\Users\Admin\AppData\Roaming\WinSocket\19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\19a0210c2ffe78ff9167dd3b2d8009dcc8df10c9fb6098a1fca99cbd993e9638.exe
Filesize1.4MB
MD553eb29f92fe9a89832da0be4b3dc52ed
SHA13170c4c2f8658fea9ffdfd0b449f1a833464a6e1
SHA25619a0210c2ffe67ff8156dd3b2d7009dcc7df10c9fb5087a1fca89cbd883e9537
SHA51239236803ca6245d4416d0cf51e269b0d12d4286bd1df3f0ce696ff78e07f6b583092201584b201abdec01d9b7f749c0b846fd825a39c7449385c91c8a3c18c5a
-
Filesize
29KB
MD5e69c167f9ab83aa47154c686ca93966e
SHA181c26a46fe3da05db0b3f6ce9e12de6fd29ecea9
SHA256f3dbcaacf34f6c6596117ef6c466c79d7e19ebb2e86852576a2242ac97882f3d
SHA5128f7d2020d24521f60b5293f6ae4bd89b3803173644ada55c2cbe464ea9350b9f8e0b88f39dd1d97845b10be811f42ffde84b6935b12f4f06979cd8e6bb14061c