Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:12
Behavioral task
behavioral1
Sample
547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791.exe
Resource
win7-20240508-en
General
-
Target
547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791.exe
-
Size
1.3MB
-
MD5
02819aba48b35ba0d52dadea6a4de550
-
SHA1
aca219781675ba31463e9ea7b2b7536be4620539
-
SHA256
547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791
-
SHA512
7b23f8aa48f5cf8ab65e69c67cb57f87d4cb151a565787b185109e111c97ea8eb5cb97d7d9805bed609eb8d7dc5a1f3bdfc8cafe83c2d254650bc054901730c2
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sd8zG7u75+FmVf6IIwQREr0ino4:E5aIwC+Agr6S/FEAGsjiIIbErJ
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002341e-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2916-15-0x0000000002300000-0x0000000002329000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe Token: SeTcbPrivilege 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2916 547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791.exe 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2916 wrote to memory of 684 2916 547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791.exe 83 PID 2916 wrote to memory of 684 2916 547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791.exe 83 PID 2916 wrote to memory of 684 2916 547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791.exe 83 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 684 wrote to memory of 4864 684 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 84 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 4688 wrote to memory of 4804 4688 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 102 PID 1532 wrote to memory of 4348 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 110 PID 1532 wrote to memory of 4348 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 110 PID 1532 wrote to memory of 4348 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 110 PID 1532 wrote to memory of 4348 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 110 PID 1532 wrote to memory of 4348 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 110 PID 1532 wrote to memory of 4348 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 110 PID 1532 wrote to memory of 4348 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 110 PID 1532 wrote to memory of 4348 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 110 PID 1532 wrote to memory of 4348 1532 648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791.exe"C:\Users\Admin\AppData\Local\Temp\547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exeC:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4864
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exeC:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4804
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exeC:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\648cbd79299e8b76b78cd02b999970996e6c7190993ebbac774499cf79224891.exe
Filesize1.3MB
MD502819aba48b35ba0d52dadea6a4de550
SHA1aca219781675ba31463e9ea7b2b7536be4620539
SHA256547cbd69288e7b65b67cd02b988960885e5c6180993ebbac664499cf69224791
SHA5127b23f8aa48f5cf8ab65e69c67cb57f87d4cb151a565787b185109e111c97ea8eb5cb97d7d9805bed609eb8d7dc5a1f3bdfc8cafe83c2d254650bc054901730c2
-
Filesize
42KB
MD50a7dfd70775daaba7f34a7d29d9f6990
SHA181786c493ab9469e9dc510add59236106c1b4850
SHA256e3be7eb336b22b7510adae52f89bf6be08b21347009282f7a6af0adaea98a1e3
SHA5126d188ddece911fd284e1bef4b25b5c7cf0a709b366fa13ec70a42e167707aa177a98574937197ab6d5e83e83e58aa0e2d60333e923b55c988d26c42bc293d6bb