Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 05:11
Behavioral task
behavioral1
Sample
f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599.exe
Resource
win7-20240419-en
General
-
Target
f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599.exe
-
Size
1.1MB
-
MD5
e2033482b1fe8d03a3fb8a16a7c99134
-
SHA1
be42717d3bf76893aad0ffd3ecce1c534ff4ef83
-
SHA256
f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599
-
SHA512
f89f9e42703ae7a3034b4a0f87ce8b505b1751295a631c626462ba7323189d0bc6fa0a80c203a8201de82c58507722f11712ac9b647460bb2c265a694766aaf5
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQqtGSsGa60C+4PMAQBnm46MoCBuu0JphT:zQ5aILMCfmAUjzX6xQtjmssdqex/n
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023407-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1724-15-0x0000000002AC0000-0x0000000002AE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe Token: SeTcbPrivilege 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1724 f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599.exe 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1852 1724 f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599.exe 82 PID 1724 wrote to memory of 1852 1724 f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599.exe 82 PID 1724 wrote to memory of 1852 1724 f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599.exe 82 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1852 wrote to memory of 4380 1852 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 84 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 1092 wrote to memory of 1824 1092 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 96 PID 4592 wrote to memory of 3148 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 98 PID 4592 wrote to memory of 3148 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 98 PID 4592 wrote to memory of 3148 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 98 PID 4592 wrote to memory of 3148 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 98 PID 4592 wrote to memory of 3148 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 98 PID 4592 wrote to memory of 3148 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 98 PID 4592 wrote to memory of 3148 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 98 PID 4592 wrote to memory of 3148 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 98 PID 4592 wrote to memory of 3148 4592 f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599.exe"C:\Users\Admin\AppData\Local\Temp\f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\WinSocket\f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exeC:\Users\Admin\AppData\Roaming\WinSocket\f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4380
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exeC:\Users\Admin\AppData\Roaming\WinSocket\f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1824
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exeC:\Users\Admin\AppData\Roaming\WinSocket\f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\f7874d9c3bdf43e83d269cb1e2963819a0f4d3c2ca1918f9b2639684a89b7699.exe
Filesize1.1MB
MD5e2033482b1fe8d03a3fb8a16a7c99134
SHA1be42717d3bf76893aad0ffd3ecce1c534ff4ef83
SHA256f6764d8c3bdf43e73d258cb1e2853719a0f4d3c2ca1917f8b2538574a79b6599
SHA512f89f9e42703ae7a3034b4a0f87ce8b505b1751295a631c626462ba7323189d0bc6fa0a80c203a8201de82c58507722f11712ac9b647460bb2c265a694766aaf5
-
Filesize
22KB
MD5f95d1cd2f85b02311beb993f8a0a4d92
SHA1d2fc5f5ac49538bf69104a96207ac81b6b7676da
SHA256a83abdf42a6e30d7534b8264f0fb9eed378b6bf1dba3b86c6e3821092d65295c
SHA51219d67a01b3dccf8718f52a79247788e1b4e40d53c6baa99370312ffbce1c82feeb99c3a9fa409ccb971b59d30ce4be3e621e880057a46d751584d264008d5f25