Analysis
-
max time kernel
136s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2024 20:22
Behavioral task
behavioral1
Sample
346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259.exe
Resource
win7-20240704-en
General
-
Target
346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259.exe
-
Size
874KB
-
MD5
312a03c4be81bb9b11c207d0e7157133
-
SHA1
87dd8518e6cbe3ad95df2263b17d79c222f585b4
-
SHA256
346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259
-
SHA512
67527e93f6565021326785cb61449a67cab4af72f0d25d1a54ac3fe9428020b8c869fec4630098dbf2f9c1b858a0dac4a3be73475769e764a9b85e235c12996b
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm13JFCVU:E5aIwC+Agr6S/FpJ1
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234ee-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2412-15-0x0000000002950000-0x0000000002979000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe Token: SeTcbPrivilege 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2412 346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259.exe 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2412 wrote to memory of 4804 2412 346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259.exe 86 PID 2412 wrote to memory of 4804 2412 346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259.exe 86 PID 2412 wrote to memory of 4804 2412 346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259.exe 86 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 4804 wrote to memory of 2236 4804 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 88 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 3252 wrote to memory of 1780 3252 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 94 PID 1592 wrote to memory of 2064 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 96 PID 1592 wrote to memory of 2064 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 96 PID 1592 wrote to memory of 2064 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 96 PID 1592 wrote to memory of 2064 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 96 PID 1592 wrote to memory of 2064 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 96 PID 1592 wrote to memory of 2064 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 96 PID 1592 wrote to memory of 2064 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 96 PID 1592 wrote to memory of 2064 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 96 PID 1592 wrote to memory of 2064 1592 347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259.exe"C:\Users\Admin\AppData\Local\Temp\346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Roaming\WinSocket\347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exeC:\Users\Admin\AppData\Roaming\WinSocket\347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2236
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exeC:\Users\Admin\AppData\Roaming\WinSocket\347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1780
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exeC:\Users\Admin\AppData\Roaming\WinSocket\347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\347e388ab90b0bcc7c4abf8d28b966dae906a24f1498bf8a22f3e80f79e4d269.exe
Filesize874KB
MD5312a03c4be81bb9b11c207d0e7157133
SHA187dd8518e6cbe3ad95df2263b17d79c222f585b4
SHA256346e377ab90b0bcc6c4abf7d27b955dae805a24f1487bf7a22f3e70f68e4d259
SHA51267527e93f6565021326785cb61449a67cab4af72f0d25d1a54ac3fe9428020b8c869fec4630098dbf2f9c1b858a0dac4a3be73475769e764a9b85e235c12996b
-
Filesize
13KB
MD5d8b837e6eed1b2a0114972d75a8aade8
SHA1203b116b91cbf0507fc1e854f9e8a10e4470b5c0
SHA256f93a6eb4e742e9e46e4289a5eb0af7bb7e1aa8b0f1bb8c133b49dcd4e9b456e8
SHA512b6d0a40b0accd4ba606065978412413fb7a1fd0de30e2cef2f9d5779ac3630db6190d74d9e434ba5b98d243cbb0cbcd88f1f51936530180029bec74040bd81e0