Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 19:56
Behavioral task
behavioral1
Sample
2ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16.exe
Resource
win7-20240419-en
General
-
Target
2ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16.exe
-
Size
1.3MB
-
MD5
4fce9750489bad1288f98987d06b252f
-
SHA1
6d74e9efdd1965525d93b7291200688c9ba82f4d
-
SHA256
2ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16
-
SHA512
e076d5b5cd0db969d5d15905d33f1079f63bac0031a742ba80327f648643ba73e1d2c9cd617f6be660590d21fb73fee1d0be5b62c2e45b146b52cf510d6f5544
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1SdrzRjVYaQ/n2lbcMfcz5l8ut:E5aIwC+Agr6S/FYqOc2ZE
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233f3-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/712-15-0x00000000029D0000-0x00000000029F9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe Token: SeTcbPrivilege 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 712 2ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16.exe 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 712 wrote to memory of 3432 712 2ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16.exe 82 PID 712 wrote to memory of 3432 712 2ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16.exe 82 PID 712 wrote to memory of 3432 712 2ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16.exe 82 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 3432 wrote to memory of 1508 3432 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 83 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 2684 wrote to memory of 4408 2684 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 103 PID 4968 wrote to memory of 4468 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 112 PID 4968 wrote to memory of 4468 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 112 PID 4968 wrote to memory of 4468 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 112 PID 4968 wrote to memory of 4468 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 112 PID 4968 wrote to memory of 4468 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 112 PID 4968 wrote to memory of 4468 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 112 PID 4968 wrote to memory of 4468 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 112 PID 4968 wrote to memory of 4468 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 112 PID 4968 wrote to memory of 4468 4968 2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16.exe"C:\Users\Admin\AppData\Local\Temp\2ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Users\Admin\AppData\Roaming\WinSocket\2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exeC:\Users\Admin\AppData\Roaming\WinSocket\2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1508
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exeC:\Users\Admin\AppData\Roaming\WinSocket\2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4408
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exeC:\Users\Admin\AppData\Roaming\WinSocket\2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\2ad21f6d7f2a3d9f979f00972b96e7b19aaf13e932c00bcc14acf068187d1e17.exe
Filesize1.3MB
MD54fce9750489bad1288f98987d06b252f
SHA16d74e9efdd1965525d93b7291200688c9ba82f4d
SHA2562ad21f5d6f2a3d8f969f00962b95e6b19aaf13e932c00bcc14acf057176d1e16
SHA512e076d5b5cd0db969d5d15905d33f1079f63bac0031a742ba80327f648643ba73e1d2c9cd617f6be660590d21fb73fee1d0be5b62c2e45b146b52cf510d6f5544
-
Filesize
25KB
MD560d4667c8776d87f2cbd6fb9f11f94e4
SHA1c5277ca91e4415be1c9c28296194f3bbf29f6247
SHA256dbf0af03d86185cc6e321e7e417e7bda7f4e92d79f7f7d38ecdc808f22e3b4c1
SHA5126a2dae9a8007612655aaa4c290947e1707937d28e80ce4df3e06a75fed9f43d1e5073d9faba66c757643ce2317f2df8c93776a2f0f59019d1a3469111013afe9