Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 00:39
Behavioral task
behavioral1
Sample
9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe
Resource
win7-20231129-en
General
-
Target
9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe
-
Size
1.1MB
-
MD5
6fd02b87db7a138b10b1bc030f4c042a
-
SHA1
2f7816b9af24c0280f30987e904327933371ee8c
-
SHA256
9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945
-
SHA512
f4bc9cbbdbc4d1cc2111995c9a4e2f15e60de5f7a8bb60a7f83a836b91d757018a71af8a7c435c812446397a143964b2073d714164e9be4054c255a66876961f
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU9+PzVh:E5aIwC+Agr6SNasrP
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4640-15-0x0000000003010000-0x0000000003039000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exepid process 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exedescription pid process Token: SeTcbPrivilege 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe Token: SeTcbPrivilege 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exepid process 4640 9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exedescription pid process target process PID 4640 wrote to memory of 4856 4640 9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe PID 4640 wrote to memory of 4856 4640 9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe PID 4640 wrote to memory of 4856 4640 9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4856 wrote to memory of 3632 4856 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 4016 wrote to memory of 940 4016 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 2512 wrote to memory of 1752 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 2512 wrote to memory of 1752 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 2512 wrote to memory of 1752 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 2512 wrote to memory of 1752 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 2512 wrote to memory of 1752 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 2512 wrote to memory of 1752 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 2512 wrote to memory of 1752 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 2512 wrote to memory of 1752 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe PID 2512 wrote to memory of 1752 2512 9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe"C:\Users\Admin\AppData\Local\Temp\9151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Roaming\WinSocket\9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exeC:\Users\Admin\AppData\Roaming\WinSocket\9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3632
-
C:\Users\Admin\AppData\Roaming\WinSocket\9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exeC:\Users\Admin\AppData\Roaming\WinSocket\9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:940
-
C:\Users\Admin\AppData\Roaming\WinSocket\9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exeC:\Users\Admin\AppData\Roaming\WinSocket\9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\9161892d9b778be2d3d4afda789ac9210be4c401fa883401c1bdb0dc3d430946.exe
Filesize1.1MB
MD56fd02b87db7a138b10b1bc030f4c042a
SHA12f7816b9af24c0280f30987e904327933371ee8c
SHA2569151782d9b667be2d3d4afda678ac9210be4c401fa773401c1bdb0dc3d430945
SHA512f4bc9cbbdbc4d1cc2111995c9a4e2f15e60de5f7a8bb60a7f83a836b91d757018a71af8a7c435c812446397a143964b2073d714164e9be4054c255a66876961f
-
Filesize
23KB
MD5d330de082bf027d4be46cfca2b9eae72
SHA166f9b3b3265bf4533a9a5abb6964fbcb9fe332d9
SHA25637ea3b6e889c278495d79494b6451428470a4f9d1699ee0cee4e8727fbee73ac
SHA512b86ec520d713e7fa19b27a70f0d068b0568af680e0effce43e4b625f971ab3a7333d1f42e257e39b153ce15b186a5fbf5863b920eed398ec7bde38cbca296eeb