Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 23:39
Behavioral task
behavioral1
Sample
21237b83e39b56108b33fa9208e20bd0N.exe
Resource
win7-20240708-en
General
-
Target
21237b83e39b56108b33fa9208e20bd0N.exe
-
Size
1.1MB
-
MD5
21237b83e39b56108b33fa9208e20bd0
-
SHA1
2da6620e429aaa64ae28c97e07411ad331dea04c
-
SHA256
dc45d3955a7ee5a57d9324bbadabd18a9163a77a558537eeb04ada72d6e1cd29
-
SHA512
24fef9944ee6813f744d6076eec1f91bef1540f0f9af4bd1b31cc352866a590ed864fb1b17ae8cef921d0f3563314bc4d81fa0ab5ddba164b6283298cfcaa770
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU9+s8juCC2SNh:E5aIwC+Agr6SNasrsFCi
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234b2-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3620-15-0x0000000003110000-0x0000000003139000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 2896 21238b93e39b67109b33fa9209e20bd0N.exe 4508 21238b93e39b67109b33fa9209e20bd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21238b93e39b67109b33fa9209e20bd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21237b83e39b56108b33fa9208e20bd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21238b93e39b67109b33fa9209e20bd0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 4508 21238b93e39b67109b33fa9209e20bd0N.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3620 21237b83e39b56108b33fa9208e20bd0N.exe 2896 21238b93e39b67109b33fa9209e20bd0N.exe 4508 21238b93e39b67109b33fa9209e20bd0N.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 3620 wrote to memory of 2896 3620 21237b83e39b56108b33fa9208e20bd0N.exe 85 PID 3620 wrote to memory of 2896 3620 21237b83e39b56108b33fa9208e20bd0N.exe 85 PID 3620 wrote to memory of 2896 3620 21237b83e39b56108b33fa9208e20bd0N.exe 85 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 2896 wrote to memory of 744 2896 21238b93e39b67109b33fa9209e20bd0N.exe 86 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 PID 4508 wrote to memory of 4316 4508 21238b93e39b67109b33fa9209e20bd0N.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\21237b83e39b56108b33fa9208e20bd0N.exe"C:\Users\Admin\AppData\Local\Temp\21237b83e39b56108b33fa9208e20bd0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Roaming\WinSocket\21238b93e39b67109b33fa9209e20bd0N.exeC:\Users\Admin\AppData\Roaming\WinSocket\21238b93e39b67109b33fa9209e20bd0N.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:744
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\21238b93e39b67109b33fa9209e20bd0N.exeC:\Users\Admin\AppData\Roaming\WinSocket\21238b93e39b67109b33fa9209e20bd0N.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD521237b83e39b56108b33fa9208e20bd0
SHA12da6620e429aaa64ae28c97e07411ad331dea04c
SHA256dc45d3955a7ee5a57d9324bbadabd18a9163a77a558537eeb04ada72d6e1cd29
SHA51224fef9944ee6813f744d6076eec1f91bef1540f0f9af4bd1b31cc352866a590ed864fb1b17ae8cef921d0f3563314bc4d81fa0ab5ddba164b6283298cfcaa770