Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 18:43
Behavioral task
behavioral1
Sample
0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe
Resource
win7-20240708-en
General
-
Target
0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe
-
Size
914KB
-
MD5
7a0a84aff88f0a603efc2bb4e316f31e
-
SHA1
99476f942fb11781be8023e9373117685887be6f
-
SHA256
0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff
-
SHA512
d733fc5a30a2ad9ec7bf7566ff4b874c01a25adbe68763118b34251c31cbf7331edbc0a19d84b482e111072b4c40074426be7227322b039812f0d9d91c842d08
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm13JWz5Qacp:E5aIwC+Agr6S/FpJIa
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2228-15-0x00000000021E0000-0x0000000002209000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exepid process 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exedescription pid process Token: SeTcbPrivilege 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe Token: SeTcbPrivilege 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exepid process 2228 0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exedescription pid process target process PID 2228 wrote to memory of 1496 2228 0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe PID 2228 wrote to memory of 1496 2228 0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe PID 2228 wrote to memory of 1496 2228 0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1496 wrote to memory of 1260 1496 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1192 wrote to memory of 1184 1192 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1112 wrote to memory of 3232 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1112 wrote to memory of 3232 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1112 wrote to memory of 3232 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1112 wrote to memory of 3232 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1112 wrote to memory of 3232 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1112 wrote to memory of 3232 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1112 wrote to memory of 3232 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1112 wrote to memory of 3232 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe PID 1112 wrote to memory of 3232 1112 0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe"C:\Users\Admin\AppData\Local\Temp\0fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\WinSocket\0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exeC:\Users\Admin\AppData\Roaming\WinSocket\0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1260
-
C:\Users\Admin\AppData\Roaming\WinSocket\0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exeC:\Users\Admin\AppData\Roaming\WinSocket\0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1184
-
C:\Users\Admin\AppData\Roaming\WinSocket\0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exeC:\Users\Admin\AppData\Roaming\WinSocket\0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\0fe60fa7c07e974922b6780fa9038eb042197cc7d478c8b46634094bba326dff.exe
Filesize914KB
MD57a0a84aff88f0a603efc2bb4e316f31e
SHA199476f942fb11781be8023e9373117685887be6f
SHA2560fe50fa6c06e864822b5670fa9037eb042186cc6d467c7b45534094bba325dff
SHA512d733fc5a30a2ad9ec7bf7566ff4b874c01a25adbe68763118b34251c31cbf7331edbc0a19d84b482e111072b4c40074426be7227322b039812f0d9d91c842d08
-
Filesize
38KB
MD5ae2506b05546971b0950f9e7998975f4
SHA199769ba1d62bcd7a07458e1cc821e05dbb40ef4a
SHA256324ecfa5c905d2c947a4d3eaa1c08fed06fc82be3ac58e40df80441bb52ce187
SHA51240ab7fd36c4c9f3bf89c25d988be12fb3896ed8e815a141f1cf7b8e90b5790b861ed3c88101e24117b0e24360455358928f702c0b8421487c0e6246a17c07de2