Analysis
-
max time kernel
138s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 21:47
Behavioral task
behavioral1
Sample
574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe
Resource
win7-20231129-en
General
-
Target
574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe
-
Size
1023KB
-
MD5
40919a3391314adde33ab0f1456eaf1f
-
SHA1
23a42184a115b875e2617df2d2bbcff4111d569a
-
SHA256
574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52
-
SHA512
2266e7df9916f8109fa3ec91881e4a7bb7203b0d01b1a23df557a7e5cb26649714907d68e7c11a55bb183db897e8b08d868a1d6c211e17f4c0021805ca50af1e
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JphG:zQ5aILMCfmAUjzX6xQtjmssdqcbu
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2728-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exepid process 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exedescription pid process Token: SeTcbPrivilege 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe Token: SeTcbPrivilege 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exepid process 2728 574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exedescription pid process target process PID 2728 wrote to memory of 4308 2728 574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe PID 2728 wrote to memory of 4308 2728 574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe PID 2728 wrote to memory of 4308 2728 574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4308 wrote to memory of 1104 4308 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 4116 wrote to memory of 1852 4116 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 2984 wrote to memory of 528 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 2984 wrote to memory of 528 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 2984 wrote to memory of 528 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 2984 wrote to memory of 528 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 2984 wrote to memory of 528 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 2984 wrote to memory of 528 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 2984 wrote to memory of 528 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 2984 wrote to memory of 528 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe PID 2984 wrote to memory of 528 2984 684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe"C:\Users\Admin\AppData\Local\Temp\574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\WinSocket\684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exeC:\Users\Admin\AppData\Roaming\WinSocket\684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1104
-
C:\Users\Admin\AppData\Roaming\WinSocket\684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exeC:\Users\Admin\AppData\Roaming\WinSocket\684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1852
-
C:\Users\Admin\AppData\Roaming\WinSocket\684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exeC:\Users\Admin\AppData\Roaming\WinSocket\684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\684480cdfff9376420cad6167e3e2b11f93997a7f969fe391927b38e93f33d62.exe
Filesize1023KB
MD540919a3391314adde33ab0f1456eaf1f
SHA123a42184a115b875e2617df2d2bbcff4111d569a
SHA256574470cdfff8365420cad5156e3e2b11f83996a6f959fe391926b37e83f33d52
SHA5122266e7df9916f8109fa3ec91881e4a7bb7203b0d01b1a23df557a7e5cb26649714907d68e7c11a55bb183db897e8b08d868a1d6c211e17f4c0021805ca50af1e
-
Filesize
36KB
MD5c3030b49542c9f166fc804f2e28d7750
SHA173dbb92083de0bd6bea6fe3a979b3d129b2ecce8
SHA2565dc396f1c130aeee10d7ba9cfd34785ca1f2c8b1ad9f2edb185bdd95afe8ec5d
SHA51241c203f36c6130a5a3259a08abce5e7e5f1d641d6189a46039a67d9ee6944ddf11ddbd63869384c3164b90dedb009b8b38ffcd93b6990d2445b0fe29c0d272de