Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 04:04
Behavioral task
behavioral1
Sample
1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe
Resource
win7-20240221-en
General
-
Target
1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe
-
Size
1.6MB
-
MD5
18967171b64ec05f37b15bbba0492140
-
SHA1
b2c826ac63f9942e9130922ef49de9e992d60de6
-
SHA256
1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49
-
SHA512
dcddbf12621ed0f636c6f6b8de0d370e07be57614cf8384e2beb393575f64718f7e8826004feb993f885eaa7f1a0299f0883b0e78b7a187ace1b4d783a410553
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/BxL+XKHZjb//8ISgHt:E5aIwC+Agr6SqCPGC6HZkIT/F
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3148-15-0x0000000002190000-0x00000000021B9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exepid process 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exedescription pid process Token: SeTcbPrivilege 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe Token: SeTcbPrivilege 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exepid process 3148 1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exedescription pid process target process PID 3148 wrote to memory of 2248 3148 1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe PID 3148 wrote to memory of 2248 3148 1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe PID 3148 wrote to memory of 2248 3148 1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 2248 wrote to memory of 4412 2248 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 4940 wrote to memory of 1908 4940 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 1468 wrote to memory of 4384 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 1468 wrote to memory of 4384 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 1468 wrote to memory of 4384 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 1468 wrote to memory of 4384 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 1468 wrote to memory of 4384 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 1468 wrote to memory of 4384 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 1468 wrote to memory of 4384 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 1468 wrote to memory of 4384 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe PID 1468 wrote to memory of 4384 1468 1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe"C:\Users\Admin\AppData\Local\Temp\1a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Roaming\WinSocket\1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exeC:\Users\Admin\AppData\Roaming\WinSocket\1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4412
-
C:\Users\Admin\AppData\Roaming\WinSocket\1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exeC:\Users\Admin\AppData\Roaming\WinSocket\1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1908
-
C:\Users\Admin\AppData\Roaming\WinSocket\1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exeC:\Users\Admin\AppData\Roaming\WinSocket\1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\1a26dac316942ee69c632dddf21f04cf98a3ad9f9e867cc36de9f442b4fa8b49.exe
Filesize1.6MB
MD518967171b64ec05f37b15bbba0492140
SHA1b2c826ac63f9942e9130922ef49de9e992d60de6
SHA2561a25dac315842ee58c532dddf21f04cf97a3ad9f9e756cc35de9f442b4fa7b49
SHA512dcddbf12621ed0f636c6f6b8de0d370e07be57614cf8384e2beb393575f64718f7e8826004feb993f885eaa7f1a0299f0883b0e78b7a187ace1b4d783a410553
-
Filesize
36KB
MD59c513cfd42ba8d469d10e6a1ecffde7f
SHA12ca6313aba61fdebbffda7575b880901da782b36
SHA256e00be16164ae49200508e4a8499f4c5d2efc517ba74a149bd42971f7a5ba0767
SHA5125116536d4098f98b2a35e8c18ef80ed20f11c04bdbea29e526696ff8ab389034dd6c8a18f70000e0e4a4c75536ec0ecd3507b880a73f30591c7cf8ccb548db9c