Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 21:43
Behavioral task
behavioral1
Sample
527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742.exe
Resource
win7-20240508-en
General
-
Target
527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742.exe
-
Size
1.3MB
-
MD5
773382fe57d6f6dd7eb9e077048df0c3
-
SHA1
89c219f24432fa4f6c3355e94b28d01e3d22dc40
-
SHA256
527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742
-
SHA512
02908a880fb3f78437a9366a7d46057fad726cfb87f34bc56acae786ee41ee2dd8d9a2f482c1b670e595819da4a56cb4f1ec0caf4dcf030737f875e30911154a
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtjmssdqex1hl+dZQZQf:E5aIwC+Agr6StYCrf
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023410-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/5116-15-0x0000000002FD0000-0x0000000002FF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe Token: SeTcbPrivilege 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5116 527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742.exe 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5116 wrote to memory of 536 5116 527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742.exe 80 PID 5116 wrote to memory of 536 5116 527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742.exe 80 PID 5116 wrote to memory of 536 5116 527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742.exe 80 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 536 wrote to memory of 3964 536 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 81 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 1964 wrote to memory of 2824 1964 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 92 PID 952 wrote to memory of 5096 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 94 PID 952 wrote to memory of 5096 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 94 PID 952 wrote to memory of 5096 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 94 PID 952 wrote to memory of 5096 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 94 PID 952 wrote to memory of 5096 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 94 PID 952 wrote to memory of 5096 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 94 PID 952 wrote to memory of 5096 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 94 PID 952 wrote to memory of 5096 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 94 PID 952 wrote to memory of 5096 952 628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742.exe"C:\Users\Admin\AppData\Local\Temp\527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Roaming\WinSocket\628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exeC:\Users\Admin\AppData\Roaming\WinSocket\628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3964
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exeC:\Users\Admin\AppData\Roaming\WinSocket\628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2824
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exeC:\Users\Admin\AppData\Roaming\WinSocket\628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:5096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\628b06c9a8e009a699fe170fe282744a8900c8e648f19634e108ed29c8a03842.exe
Filesize1.3MB
MD5773382fe57d6f6dd7eb9e077048df0c3
SHA189c219f24432fa4f6c3355e94b28d01e3d22dc40
SHA256527b05c8a7e009a598fe160fe272644a7900c7e547f19534e107ed28c7a03742
SHA51202908a880fb3f78437a9366a7d46057fad726cfb87f34bc56acae786ee41ee2dd8d9a2f482c1b670e595819da4a56cb4f1ec0caf4dcf030737f875e30911154a
-
Filesize
30KB
MD54017373a6013988f77668b9aae1cea0c
SHA1f1bafc063f02893a6f8e3571246f3dc1f533453b
SHA256bbe5ce9425a4809d01d379026a4e49ac0d7ddb983e31a81b89dc07ae292b75e1
SHA512e4980fd1a57699242ef2b3ca6530c26ddfcf4a30561348a5edf8765f783aab8eb9d9791e366ceb11c088a9984bc759b800936ab4245b516934a535f8133be1fa