Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 09:27
Behavioral task
behavioral1
Sample
e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181.exe
Resource
win7-20240221-en
General
-
Target
e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181.exe
-
Size
1.4MB
-
MD5
077861b6470e921d7c87c935acdfe875
-
SHA1
d86419d9acbdc2e44769f6f9c1d48ca3f9c0d9c1
-
SHA256
e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181
-
SHA512
921486bfed137b51cc3fd3f6044ce702bc8c36131151646c0545d63c8e1118e32c09bf84b9bec6ca70bafe4acfbc870df1fcf3ec3fa356905669ebb8f9c9af9b
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOVMId03vDM5CZ+RsTRF7l0cT:E5aIwC+Agr6StVEnmcK9dFCNW0
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023446-22.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3720-16-0x00000000029C0000-0x00000000029E9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe Token: SeTcbPrivilege 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3720 e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181.exe 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3720 wrote to memory of 4444 3720 e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181.exe 82 PID 3720 wrote to memory of 4444 3720 e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181.exe 82 PID 3720 wrote to memory of 4444 3720 e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181.exe 82 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 4444 wrote to memory of 1040 4444 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 83 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 208 wrote to memory of 2924 208 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 101 PID 516 wrote to memory of 4428 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 109 PID 516 wrote to memory of 4428 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 109 PID 516 wrote to memory of 4428 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 109 PID 516 wrote to memory of 4428 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 109 PID 516 wrote to memory of 4428 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 109 PID 516 wrote to memory of 4428 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 109 PID 516 wrote to memory of 4428 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 109 PID 516 wrote to memory of 4428 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 109 PID 516 wrote to memory of 4428 516 e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181.exe"C:\Users\Admin\AppData\Local\Temp\e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Roaming\WinSocket\e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exeC:\Users\Admin\AppData\Roaming\WinSocket\e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1040
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exeC:\Users\Admin\AppData\Roaming\WinSocket\e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2924
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exeC:\Users\Admin\AppData\Roaming\WinSocket\e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\e979f979e44772c91182962febe9a3f7c3cd27f7d6d9069229a299421ee69191.exe
Filesize1.4MB
MD5077861b6470e921d7c87c935acdfe875
SHA1d86419d9acbdc2e44769f6f9c1d48ca3f9c0d9c1
SHA256e868f968e44662c81172952febe8a3f6c3cd26f6d5d8059228a299421ee58181
SHA512921486bfed137b51cc3fd3f6044ce702bc8c36131151646c0545d63c8e1118e32c09bf84b9bec6ca70bafe4acfbc870df1fcf3ec3fa356905669ebb8f9c9af9b
-
Filesize
57KB
MD5b7fcb15abebd3e31319e43ec0e0f55f0
SHA114e1b8845e8255eb66076f86642af6cb92f0f8b6
SHA256c9b7b0bd998c438b444fe714859beac9da7ac056efd460b19bf439c16aaa727d
SHA512e9e967c0d547adaf4ebaf9a3e90ea38464e8063ce14101045f6aeec0a6e51876ab12ad03802562e1b17dd7a811f64f8814e2985d5bf9c7373b20197de1ce4745