Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 20:56
Behavioral task
behavioral1
Sample
0b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6.exe
Resource
win7-20240508-en
General
-
Target
0b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6.exe
-
Size
1.3MB
-
MD5
d248f7c597c8626635d92352b88f2f90
-
SHA1
b217544d9ada2cc64a49441f2b83aa83cf3a3d3b
-
SHA256
0b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6
-
SHA512
c0f05485973420e113985dbda1664faf8c5b882fd7bd8a483cc69f79e9e474f6b0fc469e30d06b200c6d59c8c73735b61d51dc35c545a3dfd98d9386fd5da68a
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtjmssdqex1hl+dZQZ8:E5aIwC+Agr6StYCz
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002340b-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1016-15-0x00000000021E0000-0x0000000002209000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe Token: SeTcbPrivilege 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1016 0b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6.exe 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1328 1016 0b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6.exe 80 PID 1016 wrote to memory of 1328 1016 0b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6.exe 80 PID 1016 wrote to memory of 1328 1016 0b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6.exe 80 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 1328 wrote to memory of 2796 1328 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 81 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 4964 wrote to memory of 1708 4964 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 91 PID 3920 wrote to memory of 2268 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 93 PID 3920 wrote to memory of 2268 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 93 PID 3920 wrote to memory of 2268 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 93 PID 3920 wrote to memory of 2268 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 93 PID 3920 wrote to memory of 2268 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 93 PID 3920 wrote to memory of 2268 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 93 PID 3920 wrote to memory of 2268 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 93 PID 3920 wrote to memory of 2268 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 93 PID 3920 wrote to memory of 2268 3920 0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6.exe"C:\Users\Admin\AppData\Local\Temp\0b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Roaming\WinSocket\0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exeC:\Users\Admin\AppData\Roaming\WinSocket\0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2796
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exeC:\Users\Admin\AppData\Roaming\WinSocket\0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1708
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exeC:\Users\Admin\AppData\Roaming\WinSocket\0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\0b30fda1380b12f1d696ac70119b44be628c484d9e930da7c8a2a604728ad6b7.exe
Filesize1.3MB
MD5d248f7c597c8626635d92352b88f2f90
SHA1b217544d9ada2cc64a49441f2b83aa83cf3a3d3b
SHA2560b30fda1370b12f1d585ac60118b44be527c474d9e930da6c7a2a504627ad5b6
SHA512c0f05485973420e113985dbda1664faf8c5b882fd7bd8a483cc69f79e9e474f6b0fc469e30d06b200c6d59c8c73735b61d51dc35c545a3dfd98d9386fd5da68a
-
Filesize
33KB
MD53e819d1d46abafe19978eaed297248d7
SHA15eb060ae99ecce52a9f12b3b7eb1b17c83788047
SHA256b270a6456dee8cacf707929450d9a06edac474da2306efeed2c7558b418e5d23
SHA51295ac8016871e970a63091daed8a22af8d2e9d02c76b2fc13a12212372019315761e25dc3b8e2c821aa6545c4c6017910e133fcc414505fc804bdd91063735d07