Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 05:14
Behavioral task
behavioral1
Sample
ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exe
Resource
win7-20240419-en
General
-
Target
ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exe
-
Size
1.0MB
-
MD5
88947241e59f9b69962f7758894ba774
-
SHA1
4e4b5adef9332aa6995f92fba1cb5e0c5cb2d8bb
-
SHA256
ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf
-
SHA512
fc47519887bf89caa644249fd1c902c743f0a76837b8374de925cc5a0447e5827e73c9829ac2a21b7a526ce46dbc22d79f402dd7b69fd3d3e5a0beb5f3582968
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0Jphm:zQ5aILMCfmAUjzX6xQtjmssdqOm
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1848-15-0x0000000002BC0000-0x0000000002BE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exepid process 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exedescription pid process Token: SeTcbPrivilege 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe Token: SeTcbPrivilege 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exeed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exepid process 1848 ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exe 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exeed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exedescription pid process target process PID 1848 wrote to memory of 3180 1848 ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exe ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe PID 1848 wrote to memory of 3180 1848 ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exe ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe PID 1848 wrote to memory of 3180 1848 ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exe ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 3180 wrote to memory of 4112 3180 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 4484 wrote to memory of 856 4484 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 1708 wrote to memory of 3176 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 1708 wrote to memory of 3176 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 1708 wrote to memory of 3176 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 1708 wrote to memory of 3176 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 1708 wrote to memory of 3176 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 1708 wrote to memory of 3176 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 1708 wrote to memory of 3176 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 1708 wrote to memory of 3176 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe PID 1708 wrote to memory of 3176 1708 ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exe"C:\Users\Admin\AppData\Local\Temp\ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\WinSocket\ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4112
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:856
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed1b6120d7218fbc91262102303eaf09fb1c3198107b0c8bcad4e98e88ac9aaf.exe
Filesize1.0MB
MD588947241e59f9b69962f7758894ba774
SHA14e4b5adef9332aa6995f92fba1cb5e0c5cb2d8bb
SHA256ed1b5120d6217fbc81252102303eaf08fb1c3197106b0c7bcad4e87e77ac9aaf
SHA512fc47519887bf89caa644249fd1c902c743f0a76837b8374de925cc5a0447e5827e73c9829ac2a21b7a526ce46dbc22d79f402dd7b69fd3d3e5a0beb5f3582968
-
Filesize
46KB
MD597c9d7e468fcc801397a92667b618e8e
SHA143e47d57db44b4f002fcb4f8d58f9c04040e46a9
SHA2561ffecc216708959cb9423f0f7420746c906341b19105c312c3204386c08d120e
SHA512e9713d2d2d6c3febfb57c5b3ffa7f9e46e715c22933c9895ed146ca49931bc82a10ab3b84b92c0a9f8cdbb53dd372209d203278261080d9b46118a1512d4b53e