Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 13:18
Behavioral task
behavioral1
Sample
6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe
Resource
win7-20231129-en
General
-
Target
6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe
-
Size
1.0MB
-
MD5
bbc63c0e9914c9bcacbb84324623de01
-
SHA1
09b43a084c8089d61d38f85afe905625730a808c
-
SHA256
6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb
-
SHA512
221bcd4aa22a1533b3c065b668b5b7d54ff054110c758186323fd2ad443614a53dc1e39b0dae021edca131f43b3c6ff2d0e11a21cd11727efe295f4c6f888eb3
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU9+U:E5aIwC+Agr6SNasrU
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1600-15-0x0000000002260000-0x0000000002289000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exepid process 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exedescription pid process Token: SeTcbPrivilege 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe Token: SeTcbPrivilege 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exepid process 1600 6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exedescription pid process target process PID 1600 wrote to memory of 1444 1600 6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe PID 1600 wrote to memory of 1444 1600 6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe PID 1600 wrote to memory of 1444 1600 6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 1444 wrote to memory of 3936 1444 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 216 wrote to memory of 4292 216 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 972 wrote to memory of 2116 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 972 wrote to memory of 2116 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 972 wrote to memory of 2116 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 972 wrote to memory of 2116 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 972 wrote to memory of 2116 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 972 wrote to memory of 2116 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 972 wrote to memory of 2116 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 972 wrote to memory of 2116 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe PID 972 wrote to memory of 2116 972 7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe"C:\Users\Admin\AppData\Local\Temp\6cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Roaming\WinSocket\7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exeC:\Users\Admin\AppData\Roaming\WinSocket\7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4244,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=3900 /prefetch:81⤵PID:4280
-
C:\Users\Admin\AppData\Roaming\WinSocket\7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exeC:\Users\Admin\AppData\Roaming\WinSocket\7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4292
-
C:\Users\Admin\AppData\Roaming\WinSocket\7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exeC:\Users\Admin\AppData\Roaming\WinSocket\7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\7cef04760813f396404daeed121d19ad249939c8cb0ba769cb7a241bff3b3feb.exe
Filesize1.0MB
MD5bbc63c0e9914c9bcacbb84324623de01
SHA109b43a084c8089d61d38f85afe905625730a808c
SHA2566cef04650713f395404daeed121d19ad249838c7cb0ba659cb6a241bff3b3feb
SHA512221bcd4aa22a1533b3c065b668b5b7d54ff054110c758186323fd2ad443614a53dc1e39b0dae021edca131f43b3c6ff2d0e11a21cd11727efe295f4c6f888eb3
-
Filesize
20KB
MD56c5257c5b976100a366a709dc7f8f13c
SHA117e5331a2a1a56c7afe2f9093f6e4995f7cc325e
SHA256c2925dee6af1196d9e6c47906181dbfc2c09daf67bd17fcc3767e2718eaf011b
SHA5126bacd8a888364a9d7a5ca8dffc5ea9df347afa5172cdaa6891f14a85a5b8a16e3e1a0308cc00442c27dbba155b39c32cb4f7f313abc0cf82412735ffcb2cce41