Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 04:23
Behavioral task
behavioral1
Sample
7ead9199016a67eba03b30203abcd400N.exe
Resource
win7-20240708-en
General
-
Target
7ead9199016a67eba03b30203abcd400N.exe
-
Size
1.3MB
-
MD5
7ead9199016a67eba03b30203abcd400
-
SHA1
c7c74dd876dfd85a3eeccb6ff5da31edf0ee65a8
-
SHA256
ca5bbbce065a38aa9b226a5fffadb4b628ddefd190835a850f0213dbedf65674
-
SHA512
caa2b5ef78b9519687d9efdca316b8e8fcd8c8c1ae90be0c30a442201ff2ba348ae7aa45bc29cfb35ad462c19c09c7744b7be2ab9d832392e73fee0d15a601f6
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQt+4En+bcMAOVMId03vDM5CZe0PZWVWz:E5aIwC+Agr6StVEnmcK9dFCfR
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023391-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3920-15-0x0000000002940000-0x0000000002969000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 264 8ead9199017a78eba03b30203abcd400N.exe 4984 8ead9199017a78eba03b30203abcd400N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 4984 8ead9199017a78eba03b30203abcd400N.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3920 7ead9199016a67eba03b30203abcd400N.exe 264 8ead9199017a78eba03b30203abcd400N.exe 4984 8ead9199017a78eba03b30203abcd400N.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 3920 wrote to memory of 264 3920 7ead9199016a67eba03b30203abcd400N.exe 86 PID 3920 wrote to memory of 264 3920 7ead9199016a67eba03b30203abcd400N.exe 86 PID 3920 wrote to memory of 264 3920 7ead9199016a67eba03b30203abcd400N.exe 86 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 264 wrote to memory of 4904 264 8ead9199017a78eba03b30203abcd400N.exe 87 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 PID 4984 wrote to memory of 4412 4984 8ead9199017a78eba03b30203abcd400N.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ead9199016a67eba03b30203abcd400N.exe"C:\Users\Admin\AppData\Local\Temp\7ead9199016a67eba03b30203abcd400N.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Roaming\WinSocket\8ead9199017a78eba03b30203abcd400N.exeC:\Users\Admin\AppData\Roaming\WinSocket\8ead9199017a78eba03b30203abcd400N.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4904
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\8ead9199017a78eba03b30203abcd400N.exeC:\Users\Admin\AppData\Roaming\WinSocket\8ead9199017a78eba03b30203abcd400N.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD57ead9199016a67eba03b30203abcd400
SHA1c7c74dd876dfd85a3eeccb6ff5da31edf0ee65a8
SHA256ca5bbbce065a38aa9b226a5fffadb4b628ddefd190835a850f0213dbedf65674
SHA512caa2b5ef78b9519687d9efdca316b8e8fcd8c8c1ae90be0c30a442201ff2ba348ae7aa45bc29cfb35ad462c19c09c7744b7be2ab9d832392e73fee0d15a601f6