Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 19:08
Behavioral task
behavioral1
Sample
181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe
Resource
win7-20231129-en
General
-
Target
181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe
-
Size
1.2MB
-
MD5
7481073a0ee7fe0abe281db5633b63f5
-
SHA1
50a216d5f0066a86427bf2b37a89389627140ff5
-
SHA256
181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69
-
SHA512
13eba51e8a4ce7341a7f0844f742717ee9023024dd2397e23f5ecc58c056b50f75a742aecbfbbdaf554752a779c9bb17fed7cab56603972644e5669786f2527a
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQE4efQg3zNn+2jsvercPk9N4hVI3/TQyFOo:E5aIwC+Agr6SqCPGvTz
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2804-15-0x00000000021F0000-0x0000000002219000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exepid process 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exedescription pid process Token: SeTcbPrivilege 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe Token: SeTcbPrivilege 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exepid process 2804 181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exedescription pid process target process PID 2804 wrote to memory of 3444 2804 181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe PID 2804 wrote to memory of 3444 2804 181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe PID 2804 wrote to memory of 3444 2804 181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 3444 wrote to memory of 3012 3444 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 2912 wrote to memory of 4972 2912 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 4372 wrote to memory of 5104 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 4372 wrote to memory of 5104 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 4372 wrote to memory of 5104 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 4372 wrote to memory of 5104 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 4372 wrote to memory of 5104 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 4372 wrote to memory of 5104 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 4372 wrote to memory of 5104 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 4372 wrote to memory of 5104 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe PID 4372 wrote to memory of 5104 4372 191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe"C:\Users\Admin\AppData\Local\Temp\181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\WinSocket\191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exeC:\Users\Admin\AppData\Roaming\WinSocket\191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3012
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exeC:\Users\Admin\AppData\Roaming\WinSocket\191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4972
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exeC:\Users\Admin\AppData\Roaming\WinSocket\191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:5104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\191842bc1199199e9bcfbbb8f9698c1927801fc3b8d009899d9933d7c0a12a79.exe
Filesize1.2MB
MD57481073a0ee7fe0abe281db5633b63f5
SHA150a216d5f0066a86427bf2b37a89389627140ff5
SHA256181742bc1188189e8bcfbbb7f9597c1826701fc3b7d009799d8933d6c0a12a69
SHA51213eba51e8a4ce7341a7f0844f742717ee9023024dd2397e23f5ecc58c056b50f75a742aecbfbbdaf554752a779c9bb17fed7cab56603972644e5669786f2527a
-
Filesize
45KB
MD5a2e73262e9dc7fac477ad1bb69e8f147
SHA1ac535865f943ba7799ea8caec9d8ff76145f2508
SHA256290a8e3c8cdc748e1521052cfd79d0852bbee0afcd737d9aafaf1964ff667e03
SHA512d852daf988e4218a7ae0127e781deca981109042ab34e07cff00b7c9b464f27dac7ba0958e4cfd6e3aecaf3bcc2e9f3895349c5ae93781a0ec514a7530daeb6f