Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 00:07
Behavioral task
behavioral1
Sample
8407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074.exe
Resource
win7-20240220-en
General
-
Target
8407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074.exe
-
Size
1.1MB
-
MD5
10c935f46a0b2b8ee98be35214e6bcf5
-
SHA1
1ba7928b10c88f6e93e7e5e08dde16a4ef90a5ea
-
SHA256
8407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074
-
SHA512
ff3677fbc6deb505b9cea80128bb1881c32ee07f69eeba763d57e8e0432452c9afed4421e8fddaa13b831d72263b071242e679c5e687507d5f9b8f6c6f4fe870
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU9+yS:E5aIwC+Agr6SNasrt
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023521-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4844-15-0x0000000002210000-0x0000000002239000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe Token: SeTcbPrivilege 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4844 8407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074.exe 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 2316 4844 8407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074.exe 89 PID 4844 wrote to memory of 2316 4844 8407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074.exe 89 PID 4844 wrote to memory of 2316 4844 8407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074.exe 89 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 2316 wrote to memory of 4984 2316 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 90 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 3552 wrote to memory of 4188 3552 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 105 PID 228 wrote to memory of 4688 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 107 PID 228 wrote to memory of 4688 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 107 PID 228 wrote to memory of 4688 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 107 PID 228 wrote to memory of 4688 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 107 PID 228 wrote to memory of 4688 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 107 PID 228 wrote to memory of 4688 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 107 PID 228 wrote to memory of 4688 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 107 PID 228 wrote to memory of 4688 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 107 PID 228 wrote to memory of 4688 228 9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe 107 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074.exe"C:\Users\Admin\AppData\Local\Temp\8407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Roaming\WinSocket\9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exeC:\Users\Admin\AppData\Roaming\WinSocket\9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4984
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:81⤵PID:2792
-
C:\Users\Admin\AppData\Roaming\WinSocket\9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exeC:\Users\Admin\AppData\Roaming\WinSocket\9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4188
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exeC:\Users\Admin\AppData\Roaming\WinSocket\9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\9408d7c3b6c0ad69624df96af826931a9ed3ab18ff0ab28430ed6999e99de084.exe
Filesize1.1MB
MD510c935f46a0b2b8ee98be35214e6bcf5
SHA11ba7928b10c88f6e93e7e5e08dde16a4ef90a5ea
SHA2568407d6c3b5c0ad59524df95af725931a9ed3ab17ff0ab27430ed5989e99de074
SHA512ff3677fbc6deb505b9cea80128bb1881c32ee07f69eeba763d57e8e0432452c9afed4421e8fddaa13b831d72263b071242e679c5e687507d5f9b8f6c6f4fe870
-
Filesize
30KB
MD57a351c7207e547c53498a3b2046e98aa
SHA191ea8e1cbdf74b411bcb1b11d3d977e1251ff9b2
SHA25656737892b5d579af3b62235eba82fc85dbbc4e1352998f34cb92906714042cd8
SHA5126e5ae2963b163ffbfd4f2335ee92a736bbfcdb5f2b14a44d0e98ddc7919e36be9522d479fd0018add95518d7a2d87cdce1010f751444fed803797a4b16fa20be