Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 18:45
Behavioral task
behavioral1
Sample
0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe
Resource
win7-20240220-en
General
-
Target
0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe
-
Size
1011KB
-
MD5
7ba202c9d9582461d635b342d7e83e41
-
SHA1
fafb22cbe699c6090a44ddf78ef082ade1b2d498
-
SHA256
0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14
-
SHA512
8cc2c5a9b456303db9760c840fe844a29788d82bfb906743d1a3f4b4068a7337ec5b9918bf9a2b21072e2bca001de708ae5914c29b824f39f21fef5317265a6f
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0Jphr:zQ5aILMCfmAUjzX6xQtjmssdqg
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/672-15-0x0000000002930000-0x0000000002959000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exepid process 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exedescription pid process Token: SeTcbPrivilege 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe Token: SeTcbPrivilege 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exepid process 672 0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exedescription pid process target process PID 672 wrote to memory of 1808 672 0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe PID 672 wrote to memory of 1808 672 0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe PID 672 wrote to memory of 1808 672 0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 1808 wrote to memory of 1236 1808 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 3380 wrote to memory of 1584 3380 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 2696 wrote to memory of 672 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 2696 wrote to memory of 672 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 2696 wrote to memory of 672 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 2696 wrote to memory of 672 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 2696 wrote to memory of 672 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 2696 wrote to memory of 672 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 2696 wrote to memory of 672 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 2696 wrote to memory of 672 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe PID 2696 wrote to memory of 672 2696 0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe"C:\Users\Admin\AppData\Local\Temp\0dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Roaming\WinSocket\0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exeC:\Users\Admin\AppData\Roaming\WinSocket\0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1236
-
C:\Users\Admin\AppData\Roaming\WinSocket\0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exeC:\Users\Admin\AppData\Roaming\WinSocket\0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1584
-
C:\Users\Admin\AppData\Roaming\WinSocket\0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exeC:\Users\Admin\AppData\Roaming\WinSocket\0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\0dedcc2d899949f60fffdbc49182799b698321f9af29da373030cb27b93e8e14.exe
Filesize1011KB
MD57ba202c9d9582461d635b342d7e83e41
SHA1fafb22cbe699c6090a44ddf78ef082ade1b2d498
SHA2560dedcc2d798848f50fffdbc49172689b587321f9af29da363030cb26b83e7e14
SHA5128cc2c5a9b456303db9760c840fe844a29788d82bfb906743d1a3f4b4068a7337ec5b9918bf9a2b21072e2bca001de708ae5914c29b824f39f21fef5317265a6f
-
Filesize
25KB
MD57d61dc8632a71479f1c983b5e8713e91
SHA1b21c98a51dffe9ecaeb5f5da4600f9b6dd04aacf
SHA256a6ee7997b43d8b3a0a2ecaf948f2ca758be21fec15380b491d389948169d09cc
SHA512b8bdfca6278898a68e4e2b7140b9205bd9106b817ba66ef4b0503eae64beaa9a71c0fd536e175db390447ade74a7b27feea664f839dcdcec0d8b7970477bb66c