Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 18:37
Behavioral task
behavioral1
Sample
0a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0.exe
Resource
win7-20240221-en
General
-
Target
0a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0.exe
-
Size
1.3MB
-
MD5
b23b247cc92fb50f0049734949f4178e
-
SHA1
5716cb7d75f36614e6f7d9d8610b90c09dc3ce53
-
SHA256
0a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0
-
SHA512
e3761afd2770b120d453a584f4a92ce5471bae520ee83534e182b441ff03a6b9adebb3100c3027eef0da15c7a1b37b1aae227cf25b35857b2eb37bd85159ee0d
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtjmssdqex1hl+dZNNvZ:E5aIwC+Agr6StYCN7
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023476-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3940-16-0x00000000022B0000-0x00000000022D9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe Token: SeTcbPrivilege 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3940 0a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0.exe 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 1020 3940 0a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0.exe 78 PID 3940 wrote to memory of 1020 3940 0a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0.exe 78 PID 3940 wrote to memory of 1020 3940 0a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0.exe 78 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 1020 wrote to memory of 5028 1020 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 79 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 2404 wrote to memory of 2912 2404 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 81 PID 60 wrote to memory of 2968 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 83 PID 60 wrote to memory of 2968 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 83 PID 60 wrote to memory of 2968 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 83 PID 60 wrote to memory of 2968 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 83 PID 60 wrote to memory of 2968 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 83 PID 60 wrote to memory of 2968 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 83 PID 60 wrote to memory of 2968 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 83 PID 60 wrote to memory of 2968 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 83 PID 60 wrote to memory of 2968 60 0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe 83 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0.exe"C:\Users\Admin\AppData\Local\Temp\0a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Roaming\WinSocket\0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exeC:\Users\Admin\AppData\Roaming\WinSocket\0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:5028
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exeC:\Users\Admin\AppData\Roaming\WinSocket\0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2912
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exeC:\Users\Admin\AppData\Roaming\WinSocket\0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\0a7b964bf91818329aa4271668b1d2410996b470b00e3d071022f9dc7ea11be0.exe
Filesize1.3MB
MD5b23b247cc92fb50f0049734949f4178e
SHA15716cb7d75f36614e6f7d9d8610b90c09dc3ce53
SHA2560a6b954bf91717329aa4261557b1d2410885b460b00e3d061022f8dc6ea11be0
SHA512e3761afd2770b120d453a584f4a92ce5471bae520ee83534e182b441ff03a6b9adebb3100c3027eef0da15c7a1b37b1aae227cf25b35857b2eb37bd85159ee0d
-
Filesize
29KB
MD599e9b21fb088aee5df2850f9a52cd792
SHA13aa62bef750d7ca640dfd6ea9295e85fbf258d56
SHA256529061d39246bb4ec1b9ba464b40d7d3cd0d50744c472fce79f42ad8d69735cf
SHA51265fee8b9199110df869420b7be91ac5dbc9e8f423bdc74c93a1c12d5692db3c37dca8eaa16ebda4cba731091e2aa170d63b95bb757f1297a9524d7a0f523c5f6