Analysis
-
max time kernel
136s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 01:00
Behavioral task
behavioral1
Sample
9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe
Resource
win7-20240508-en
General
-
Target
9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe
-
Size
1.2MB
-
MD5
b29d2508ff170d49747a0d173635e918
-
SHA1
09d76d17809922cac31558833efe36438e7b9c54
-
SHA256
9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412
-
SHA512
9d66ee0e6cfe338d0ecad83a9eb86e4367793801f1a66953ba9fbfeff2bda847eb4e0769bd0b75445909d1ea79142865837ed50741bfaa2476b7370e9a3b1d8b
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOFZ+jJ/1q0GrbcUxnMj0K:E5aIwC+Agr6StVEnmcKWnq0vljt
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1844-15-0x00000000029D0000-0x00000000029F9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exepid process 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exedescription pid process Token: SeTcbPrivilege 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe Token: SeTcbPrivilege 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exepid process 1844 9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exedescription pid process target process PID 1844 wrote to memory of 3008 1844 9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe PID 1844 wrote to memory of 3008 1844 9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe PID 1844 wrote to memory of 3008 1844 9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3008 wrote to memory of 4608 3008 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 4540 wrote to memory of 3832 4540 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3452 wrote to memory of 2300 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3452 wrote to memory of 2300 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3452 wrote to memory of 2300 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3452 wrote to memory of 2300 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3452 wrote to memory of 2300 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3452 wrote to memory of 2300 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3452 wrote to memory of 2300 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3452 wrote to memory of 2300 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe PID 3452 wrote to memory of 2300 3452 9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe"C:\Users\Admin\AppData\Local\Temp\9ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Roaming\WinSocket\9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exeC:\Users\Admin\AppData\Roaming\WinSocket\9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4608
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exeC:\Users\Admin\AppData\Roaming\WinSocket\9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3832
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exeC:\Users\Admin\AppData\Roaming\WinSocket\9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\9ce2af16fe90a9239249408479ca4dbab937c98243e2c8206c1b606894f92412.exe
Filesize1.2MB
MD5b29d2508ff170d49747a0d173635e918
SHA109d76d17809922cac31558833efe36438e7b9c54
SHA2569ce2af15fe90a8239249407469ca4dbab936c87243e2c7205c1b505794f82412
SHA5129d66ee0e6cfe338d0ecad83a9eb86e4367793801f1a66953ba9fbfeff2bda847eb4e0769bd0b75445909d1ea79142865837ed50741bfaa2476b7370e9a3b1d8b
-
Filesize
18KB
MD563fc0dfc8f45abaa7b74cae9e0de33e4
SHA1e766ab65a0213f6474ba9776051c7e3c84f041eb
SHA256fe18484c6e8aa182a25da96abfa25d52726422416646528605795a063bc10ae8
SHA512bb2dfc18e31bf23a0aed7862a688655e398bb0c1ac026fc754818f85849ddc4b88a621e5f2981bed4157f56c086dd1d523510dae0d29d10ad011d8a845c98a41