Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 08:29 UTC
Behavioral task
behavioral1
Sample
e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea.exe
Resource
win7-20240221-en
General
-
Target
e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea.exe
-
Size
1.2MB
-
MD5
e73e690ead1546ded59ba3824e02beb2
-
SHA1
71bfaa95c34f0c85f5e614c842a28797fa62d498
-
SHA256
e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea
-
SHA512
7b9fb5e1ba0fa26fd9d4bc219ac449db0d9af73c8c7374ebc84462f00e61ae902f093515ef7ee34080cb5398f0287809606d47926f7feee209d6f0492f78c0e1
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU95QyJ5GdO8bU:E5aIwC+Agr6SNasOJ5T
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023278-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4076-17-0x0000000003130000-0x0000000003159000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4076 e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea.exe 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 4076 wrote to memory of 4004 4076 e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea.exe 91 PID 4076 wrote to memory of 4004 4076 e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea.exe 91 PID 4076 wrote to memory of 4004 4076 e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea.exe 91 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 4004 wrote to memory of 32 4004 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 92 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 PID 3824 wrote to memory of 4252 3824 e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea.exe"C:\Users\Admin\AppData\Local\Temp\e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Roaming\WinSocket\e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exeC:\Users\Admin\AppData\Roaming\WinSocket\e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:32
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4232 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:4152
-
C:\Users\Admin\AppData\Roaming\WinSocket\e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exeC:\Users\Admin\AppData\Roaming\WinSocket\e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4252
-
Network
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request140.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.23.12.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestchromewebstore.googleapis.comIN AResponsechromewebstore.googleapis.comIN A216.58.212.234chromewebstore.googleapis.comIN A172.217.169.74chromewebstore.googleapis.comIN A172.217.169.42chromewebstore.googleapis.comIN A142.250.179.234chromewebstore.googleapis.comIN A142.250.180.10chromewebstore.googleapis.comIN A142.250.187.202chromewebstore.googleapis.comIN A142.250.187.234chromewebstore.googleapis.comIN A142.250.178.10chromewebstore.googleapis.comIN A172.217.16.234chromewebstore.googleapis.comIN A142.250.200.10chromewebstore.googleapis.comIN A142.250.200.42chromewebstore.googleapis.comIN A216.58.201.106chromewebstore.googleapis.comIN A216.58.204.74chromewebstore.googleapis.comIN A216.58.213.10chromewebstore.googleapis.comIN A172.217.169.10
-
Remote address:8.8.8.8:53Requestchromewebstore.googleapis.comIN UnknownResponse
-
Remote address:8.8.8.8:53Requestpki.googIN AResponsepki.googIN A216.239.32.29
-
Remote address:8.8.8.8:53Requestpki.googIN UnknownResponse
-
Remote address:216.239.32.29:80RequestGET /gsr1/gsr1.crt HTTP/1.1
Host: pki.goog
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36 Edg/122.0.0.0
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Content-Encoding: gzip
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
Content-Length: 797
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 0
Date: Fri, 07 Jun 2024 07:43:00 GMT
Expires: Fri, 07 Jun 2024 08:33:00 GMT
Cache-Control: public, max-age=3000
Age: 2918
Last-Modified: Wed, 20 May 2020 16:45:00 GMT
Content-Type: application/pkix-cert
Vary: Accept-Encoding
-
Remote address:216.239.32.29:80RequestGET /repo/certs/gtsr1.der HTTP/1.1
Host: pki.goog
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36 Edg/122.0.0.0
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
Content-Length: 1371
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 0
Date: Fri, 07 Jun 2024 07:42:46 GMT
Expires: Fri, 07 Jun 2024 08:32:46 GMT
Cache-Control: public, max-age=3000
Age: 2932
Last-Modified: Sun, 25 Jun 2023 02:58:00 GMT
Content-Type: application/pkix-cert
Vary: Accept-Encoding
-
Remote address:216.239.32.29:80RequestGET /repo/certs/gts1c3.der HTTP/1.1
Host: pki.goog
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36 Edg/122.0.0.0
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
ResponseHTTP/1.1 200 OK
Content-Encoding: gzip
Content-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts
Cross-Origin-Resource-Policy: cross-origin
Cross-Origin-Opener-Policy: same-origin; report-to="cacerts"
Report-To: {"group":"cacerts","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/cacerts"}]}
Content-Length: 1304
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 0
Date: Fri, 07 Jun 2024 07:46:47 GMT
Expires: Fri, 07 Jun 2024 08:36:47 GMT
Cache-Control: public, max-age=3000
Age: 2692
Last-Modified: Mon, 17 Aug 2020 09:45:00 GMT
Content-Type: application/pkix-cert
Vary: Accept-Encoding
-
Remote address:8.8.8.8:53Request234.212.58.216.in-addr.arpaIN PTRResponse234.212.58.216.in-addr.arpaIN PTRlhr25s28-in-f101e100net234.212.58.216.in-addr.arpaIN PTRams16s22-in-f10�I234.212.58.216.in-addr.arpaIN PTRams16s22-in-f234�I
-
Remote address:8.8.8.8:53Request29.32.239.216.in-addr.arpaIN PTRResponse29.32.239.216.in-addr.arpaIN PTRany-in-201d1e100net
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request144.107.17.2.in-addr.arpaIN PTRResponse144.107.17.2.in-addr.arpaIN PTRa2-17-107-144deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.173.189.20.in-addr.arpaIN PTRResponse
-
973 B 5.2kB 8 8
-
1.3kB 6.1kB 10 10
HTTP Request
GET http://pki.goog/gsr1/gsr1.crtHTTP Response
200HTTP Request
GET http://pki.goog/repo/certs/gtsr1.derHTTP Response
200HTTP Request
GET http://pki.goog/repo/certs/gts1c3.derHTTP Response
200 -
260 B 5
-
260 B 5
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
140.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
50.23.12.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
75 B 315 B 1 1
DNS Request
chromewebstore.googleapis.com
DNS Response
216.58.212.234172.217.169.74172.217.169.42142.250.179.234142.250.180.10142.250.187.202142.250.187.234142.250.178.10172.217.16.234142.250.200.10142.250.200.42216.58.201.106216.58.204.74216.58.213.10172.217.169.10
-
75 B 132 B 1 1
DNS Request
chromewebstore.googleapis.com
-
54 B 70 B 1 1
DNS Request
pki.goog
DNS Response
216.239.32.29
-
54 B 128 B 1 1
DNS Request
pki.goog
-
73 B 173 B 1 1
DNS Request
234.212.58.216.in-addr.arpa
-
72 B 107 B 1 1
DNS Request
29.32.239.216.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
144.107.17.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
3.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\e2b9a92c9f4ffe7c0369401d6f07f0299701edfaa27099f87f603fca3236eaea.exe
Filesize1.2MB
MD5e73e690ead1546ded59ba3824e02beb2
SHA171bfaa95c34f0c85f5e614c842a28797fa62d498
SHA256e2b9a92c8f4ffe6c0358401d5f06f0299601edfaa26089f76f503fca3235eaea
SHA5127b9fb5e1ba0fa26fd9d4bc219ac449db0d9af73c8c7374ebc84462f00e61ae902f093515ef7ee34080cb5398f0287809606d47926f7feee209d6f0492f78c0e1