Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 18:04
Behavioral task
behavioral1
Sample
000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe
Resource
win7-20240221-en
General
-
Target
000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe
-
Size
1.1MB
-
MD5
4530c376c13a16b2efc03cd4498d9694
-
SHA1
9a47cd2fdc4aa6a0b87afb6b717c6af89cfb04ed
-
SHA256
000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c
-
SHA512
72e6d661904144ac9c797ee91b8ebb37f082253b8488a469cd0cbb33d97262e09879300a588bd9bc158cd993f0eaf21b03014a2ea43b88bc458275f5230e37d3
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSM6x4:E5aIwC+Agr6SNC4
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2112-15-0x00000000021F0000-0x0000000002219000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exepid process 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exedescription pid process Token: SeTcbPrivilege 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe Token: SeTcbPrivilege 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exepid process 2112 000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exedescription pid process target process PID 2112 wrote to memory of 2816 2112 000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe PID 2112 wrote to memory of 2816 2112 000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe PID 2112 wrote to memory of 2816 2112 000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2816 wrote to memory of 1768 2816 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 3436 wrote to memory of 3096 3436 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2036 wrote to memory of 4540 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2036 wrote to memory of 4540 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2036 wrote to memory of 4540 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2036 wrote to memory of 4540 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2036 wrote to memory of 4540 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2036 wrote to memory of 4540 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2036 wrote to memory of 4540 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2036 wrote to memory of 4540 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe PID 2036 wrote to memory of 4540 2036 000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe"C:\Users\Admin\AppData\Local\Temp\000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\WinSocket\000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exeC:\Users\Admin\AppData\Roaming\WinSocket\000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1768
-
C:\Users\Admin\AppData\Roaming\WinSocket\000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exeC:\Users\Admin\AppData\Roaming\WinSocket\000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3096
-
C:\Users\Admin\AppData\Roaming\WinSocket\000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exeC:\Users\Admin\AppData\Roaming\WinSocket\000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\000eb84b6b4f700e71acef97d90f037a0272b2c3319e4672724a86bb844bdf0c.exe
Filesize1.1MB
MD54530c376c13a16b2efc03cd4498d9694
SHA19a47cd2fdc4aa6a0b87afb6b717c6af89cfb04ed
SHA256000eb74b5b4f600e61acef96d90f036a0262b2c3318e4562624a75bb744bdf0c
SHA51272e6d661904144ac9c797ee91b8ebb37f082253b8488a469cd0cbb33d97262e09879300a588bd9bc158cd993f0eaf21b03014a2ea43b88bc458275f5230e37d3
-
Filesize
44KB
MD51306a7807fd742f1895166035a83a0e2
SHA1cd354d90158033d56bdf147c27e312797e117bf7
SHA256e6048677844ff224fe183892b0bcb3451a82ea3f169ffcd420de7b25fdace120
SHA5121fc9815966e5ec04bbfa08e09e3aa011d8a75f55d484047b51097af1b3829a83f96ca974ce605a3bf507e7ee44d7eb4105f13401fc38b52da8202838b6b2cf2a