Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 01:32
Behavioral task
behavioral1
Sample
7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe
Resource
win7-20240419-en
General
-
Target
7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe
-
Size
1.5MB
-
MD5
66a838326e4f15181fa7198a8fefc188
-
SHA1
ea6def4cb2dbab66d9ccc517cd0334624b819f31
-
SHA256
7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b
-
SHA512
7345c23bd91643ee0c3eb3af9b7ecc3a940af2236f2d3d1429122c5b7e86000f37132bcf793a6fe3c86ef1b5e32451e5e6fba54345dbd7eb0433fdcdb6447d4e
-
SSDEEP
24576:zQ5aILMCfmAUjzX677WOMcT/X2dI7T2FAoUcUOp6doF5ES/okoU4:E5aIwC+Agr6tdlmU1/eohZ
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4332-16-0x0000000002330000-0x0000000002359000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exepid process 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exedescription pid process Token: SeTcbPrivilege 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe Token: SeTcbPrivilege 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exepid process 4332 7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exedescription pid process target process PID 4332 wrote to memory of 3840 4332 7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe PID 4332 wrote to memory of 3840 4332 7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe PID 4332 wrote to memory of 3840 4332 7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 3840 wrote to memory of 4088 3840 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 4324 wrote to memory of 2628 4324 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 1416 wrote to memory of 2364 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 1416 wrote to memory of 2364 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 1416 wrote to memory of 2364 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 1416 wrote to memory of 2364 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 1416 wrote to memory of 2364 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 1416 wrote to memory of 2364 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 1416 wrote to memory of 2364 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 1416 wrote to memory of 2364 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe PID 1416 wrote to memory of 2364 1416 8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe"C:\Users\Admin\AppData\Local\Temp\7e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Roaming\WinSocket\8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exeC:\Users\Admin\AppData\Roaming\WinSocket\8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4088
-
C:\Users\Admin\AppData\Roaming\WinSocket\8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exeC:\Users\Admin\AppData\Roaming\WinSocket\8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2628
-
C:\Users\Admin\AppData\Roaming\WinSocket\8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exeC:\Users\Admin\AppData\Roaming\WinSocket\8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\8e8901376a799a24dfec930bdb3c8692bc2cc11dfa1b8b9f3f69b20078bc1b0b.exe
Filesize1.5MB
MD566a838326e4f15181fa7198a8fefc188
SHA1ea6def4cb2dbab66d9ccc517cd0334624b819f31
SHA2567e7801365a688a24dfec930bdb3c7582bc2cc11dfa1b7b9f3f58b20067bc1b0b
SHA5127345c23bd91643ee0c3eb3af9b7ecc3a940af2236f2d3d1429122c5b7e86000f37132bcf793a6fe3c86ef1b5e32451e5e6fba54345dbd7eb0433fdcdb6447d4e
-
Filesize
63KB
MD5dd98d5437bf1298d9e0bab25678477a1
SHA1961bcb704e24f9218e8763943854cfd715c02039
SHA256d3559600d03c3704dd48384b4a6d02903c557fd0155a1292ee7beeae2977c404
SHA5123174d7144eb7d0dffc2f1a304574adb597895a5a5eeeddab40a9ed11688d57a00badb6248a452c7e5370d74c472769c77e14211d08424b7b5eb03f2d6857d190