Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 21:34
Behavioral task
behavioral1
Sample
49b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1.exe
Resource
win7-20240221-en
General
-
Target
49b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1.exe
-
Size
1.1MB
-
MD5
690363b61f68563389ca8db1ca785af0
-
SHA1
74bdc9e31586b2cb576d3eaa1a8b0de372ca8d12
-
SHA256
49b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1
-
SHA512
41d415388a67e857c80df205ba7337d51a03aa77de87f3ad51f3f77f53b39ce033d2e5176762fedf3671da8fe3c2d84535514aadb8a2ea39f1740640dce9d6ee
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU9+oSAkg:E5aIwC+Agr6SNasr7g
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000233ef-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2784-15-0x0000000002160000-0x0000000002189000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe Token: SeTcbPrivilege 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2784 49b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1.exe 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 1980 2784 49b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1.exe 82 PID 2784 wrote to memory of 1980 2784 49b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1.exe 82 PID 2784 wrote to memory of 1980 2784 49b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1.exe 82 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 1980 wrote to memory of 4092 1980 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 84 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 4172 wrote to memory of 1240 4172 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 95 PID 2712 wrote to memory of 4428 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 97 PID 2712 wrote to memory of 4428 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 97 PID 2712 wrote to memory of 4428 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 97 PID 2712 wrote to memory of 4428 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 97 PID 2712 wrote to memory of 4428 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 97 PID 2712 wrote to memory of 4428 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 97 PID 2712 wrote to memory of 4428 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 97 PID 2712 wrote to memory of 4428 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 97 PID 2712 wrote to memory of 4428 2712 49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1.exe"C:\Users\Admin\AppData\Local\Temp\49b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\WinSocket\49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exeC:\Users\Admin\AppData\Roaming\WinSocket\49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4092
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exeC:\Users\Admin\AppData\Roaming\WinSocket\49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1240
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exeC:\Users\Admin\AppData\Roaming\WinSocket\49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\49b429ce66f8721d748993484af1c662bc1c6a3800397084c67e8cc92001c4d1.exe
Filesize1.1MB
MD5690363b61f68563389ca8db1ca785af0
SHA174bdc9e31586b2cb576d3eaa1a8b0de372ca8d12
SHA25649b429ce55f7621d647983474af1c552bc1c5a3700386074c56e7cc92001c4d1
SHA51241d415388a67e857c80df205ba7337d51a03aa77de87f3ad51f3f77f53b39ce033d2e5176762fedf3671da8fe3c2d84535514aadb8a2ea39f1740640dce9d6ee
-
Filesize
57KB
MD5251e40366e5084d10ee2f0ca8c07bed1
SHA16bb3474348f9355600ddf7c2e1d43f5deb40fc62
SHA25648f09e4503a0dc3818879a1e7630fd38c44da574bcb84cf34fcf78c2ee3c3bf7
SHA512f07ea1dd42d459cae2099577b146821880cc4e70866ee36332f971df67f0f78e936c47dccdbb2ceaa7b988a9f7c1741aba37d0072112195d092bb83f6a8633d4