Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 00:59
Behavioral task
behavioral1
Sample
76821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4.exe
Resource
win7-20231129-en
General
-
Target
76821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4.exe
-
Size
1.0MB
-
MD5
2db5244491847dca25de6f13731585ae
-
SHA1
fdd0eae1c9a0739d69db5539fa1b0e3e2600a5f5
-
SHA256
76821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4
-
SHA512
d2cc2d6f86190df9365087eca911eb3e30d0d00047bcb71ef2f9d263931281ca4e27486ee6a3a81f228760c1e49fa8735e72e9ab014cda14c654b0a5825680ac
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0Jphc:zQ5aILMCfmAUjzX6xQtjmssdqNYJuB
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000800000002343a-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2144-15-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe Token: SeTcbPrivilege 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2144 76821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4.exe 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3320 2144 76821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4.exe 82 PID 2144 wrote to memory of 3320 2144 76821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4.exe 82 PID 2144 wrote to memory of 3320 2144 76821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4.exe 82 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 3320 wrote to memory of 384 3320 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 83 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 2400 wrote to memory of 3068 2400 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 93 PID 1596 wrote to memory of 448 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 95 PID 1596 wrote to memory of 448 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 95 PID 1596 wrote to memory of 448 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 95 PID 1596 wrote to memory of 448 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 95 PID 1596 wrote to memory of 448 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 95 PID 1596 wrote to memory of 448 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 95 PID 1596 wrote to memory of 448 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 95 PID 1596 wrote to memory of 448 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 95 PID 1596 wrote to memory of 448 1596 87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\76821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4.exe"C:\Users\Admin\AppData\Local\Temp\76821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Roaming\WinSocket\87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exeC:\Users\Admin\AppData\Roaming\WinSocket\87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:384
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exeC:\Users\Admin\AppData\Roaming\WinSocket\87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3068
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exeC:\Users\Admin\AppData\Roaming\WinSocket\87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\87921d7d0f69d01e308c0e8073149b291ce01af40f443e1244eb7406e82a1ab4.exe
Filesize1.0MB
MD52db5244491847dca25de6f13731585ae
SHA1fdd0eae1c9a0739d69db5539fa1b0e3e2600a5f5
SHA25676821d6d0f58d01e307c0e7063148b291ce01af40f443e1244eb6405e72a1ab4
SHA512d2cc2d6f86190df9365087eca911eb3e30d0d00047bcb71ef2f9d263931281ca4e27486ee6a3a81f228760c1e49fa8735e72e9ab014cda14c654b0a5825680ac
-
Filesize
67KB
MD55d461d335203813a2851739ec003ff88
SHA1a7c2bdac97274bd16a32313a5662f8ce3d9d4424
SHA256c0157440d37f53308230a367ab0544d29a209f5e985fda6d00740c21a8854309
SHA5123a67451c371fbc7efe38dc533b4fef87982e3d830610950180f0e111688f95a08c48e0d102d231da54a466ff81d6a1fb9d404cc683115a6fc729300cd387f8fc