Analysis
-
max time kernel
138s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 21:19
Behavioral task
behavioral1
Sample
07a93d1b791f806cb9a2a24251e7f410.exe
Resource
win7-20240705-en
General
-
Target
07a93d1b791f806cb9a2a24251e7f410.exe
-
Size
1.2MB
-
MD5
07a93d1b791f806cb9a2a24251e7f410
-
SHA1
9fe049e30a34792d8fab0d2d3b72ae736fb84ee7
-
SHA256
9933b6a09784801f5015300af6a49b0092513c41fec22cc76d51f031af0813c0
-
SHA512
6f009fa1f008a83f109646594e80d265a17fbfc3060e18af2257b20ede2dc5c585ef28a16c9ccea91db6aed1bdc8aad38ee4adc18207c596431bd1d9a8362d89
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtjmssdqex1hl+dZQZOx:E5aIwC+Agr6StYCfx
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002340d-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/764-15-0x0000000002260000-0x0000000002289000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2448 08a93d1b891f907cb9a2a24261e8f410.exe 3392 08a93d1b891f907cb9a2a24261e8f410.exe 1836 08a93d1b891f907cb9a2a24261e8f410.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3392 08a93d1b891f907cb9a2a24261e8f410.exe Token: SeTcbPrivilege 1836 08a93d1b891f907cb9a2a24261e8f410.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 764 07a93d1b791f806cb9a2a24251e7f410.exe 2448 08a93d1b891f907cb9a2a24261e8f410.exe 3392 08a93d1b891f907cb9a2a24261e8f410.exe 1836 08a93d1b891f907cb9a2a24261e8f410.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 764 wrote to memory of 2448 764 07a93d1b791f806cb9a2a24251e7f410.exe 83 PID 764 wrote to memory of 2448 764 07a93d1b791f806cb9a2a24251e7f410.exe 83 PID 764 wrote to memory of 2448 764 07a93d1b791f806cb9a2a24251e7f410.exe 83 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 2448 wrote to memory of 3712 2448 08a93d1b891f907cb9a2a24261e8f410.exe 85 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 3392 wrote to memory of 4472 3392 08a93d1b891f907cb9a2a24261e8f410.exe 91 PID 1836 wrote to memory of 4680 1836 08a93d1b891f907cb9a2a24261e8f410.exe 93 PID 1836 wrote to memory of 4680 1836 08a93d1b891f907cb9a2a24261e8f410.exe 93 PID 1836 wrote to memory of 4680 1836 08a93d1b891f907cb9a2a24261e8f410.exe 93 PID 1836 wrote to memory of 4680 1836 08a93d1b891f907cb9a2a24261e8f410.exe 93 PID 1836 wrote to memory of 4680 1836 08a93d1b891f907cb9a2a24261e8f410.exe 93 PID 1836 wrote to memory of 4680 1836 08a93d1b891f907cb9a2a24261e8f410.exe 93 PID 1836 wrote to memory of 4680 1836 08a93d1b891f907cb9a2a24261e8f410.exe 93 PID 1836 wrote to memory of 4680 1836 08a93d1b891f907cb9a2a24261e8f410.exe 93 PID 1836 wrote to memory of 4680 1836 08a93d1b891f907cb9a2a24261e8f410.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a93d1b791f806cb9a2a24251e7f410.exe"C:\Users\Admin\AppData\Local\Temp\07a93d1b791f806cb9a2a24251e7f410.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\WinSocket\08a93d1b891f907cb9a2a24261e8f410.exeC:\Users\Admin\AppData\Roaming\WinSocket\08a93d1b891f907cb9a2a24261e8f410.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3712
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\08a93d1b891f907cb9a2a24261e8f410.exeC:\Users\Admin\AppData\Roaming\WinSocket\08a93d1b891f907cb9a2a24261e8f410.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4472
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\08a93d1b891f907cb9a2a24261e8f410.exeC:\Users\Admin\AppData\Roaming\WinSocket\08a93d1b891f907cb9a2a24261e8f410.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD507a93d1b791f806cb9a2a24251e7f410
SHA19fe049e30a34792d8fab0d2d3b72ae736fb84ee7
SHA2569933b6a09784801f5015300af6a49b0092513c41fec22cc76d51f031af0813c0
SHA5126f009fa1f008a83f109646594e80d265a17fbfc3060e18af2257b20ede2dc5c585ef28a16c9ccea91db6aed1bdc8aad38ee4adc18207c596431bd1d9a8362d89
-
Filesize
42KB
MD52d21f250edad47071a217a42234b219c
SHA1d273eb2809348b7b8241d4037e6eb36634f00c6d
SHA256acc2ac5e035eef6f74025e228f48229d294b11c91271614db948fb76da237f9e
SHA512d9ac9e9f45f3ee60c3967556aaaf1e9fca90b613625690bde3fa2e05b329686157e60cb9911f11f5b2cf12163dcd9e685831d7fbbfede5fe09afc9fad99ce44d