Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 03:16
Behavioral task
behavioral1
Sample
55ef12a981ff94f6c143d108d9dccec0N.exe
Resource
win7-20240704-en
General
-
Target
55ef12a981ff94f6c143d108d9dccec0N.exe
-
Size
914KB
-
MD5
55ef12a981ff94f6c143d108d9dccec0
-
SHA1
25189bbd538829a1ffba64a0e436bc02192c7603
-
SHA256
1d9ef62d36155fca044aa6984284ef38bcd734c0bc2efb6996c7ef55691a53a9
-
SHA512
4aa34b0a566bd55184a5a29c3e81f536e919c609cf1f4bc3639f9d7efd0d8bf13e812f6a21ac315ddf9e8538996d5ea1da85b47f722e83bde3cd5c9d96308abc
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQGCsksQjn6YHldGm1ufSD8Gl+xbbsm:zQ5aILMCfmAUjzX6xQGCZLFdGm13J+ym
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234de-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3036-15-0x00000000024C0000-0x00000000024E9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 4232 66ef12a991ff94f7c143d109d9dccec0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66ef12a991ff94f7c143d109d9dccec0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66ef12a991ff94f7c143d109d9dccec0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55ef12a981ff94f6c143d108d9dccec0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 4232 66ef12a991ff94f7c143d109d9dccec0N.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3036 55ef12a981ff94f6c143d108d9dccec0N.exe 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 4232 66ef12a991ff94f7c143d109d9dccec0N.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3376 3036 55ef12a981ff94f6c143d108d9dccec0N.exe 85 PID 3036 wrote to memory of 3376 3036 55ef12a981ff94f6c143d108d9dccec0N.exe 85 PID 3036 wrote to memory of 3376 3036 55ef12a981ff94f6c143d108d9dccec0N.exe 85 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 3376 wrote to memory of 1592 3376 66ef12a991ff94f7c143d109d9dccec0N.exe 87 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 PID 4232 wrote to memory of 4104 4232 66ef12a991ff94f7c143d109d9dccec0N.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\55ef12a981ff94f6c143d108d9dccec0N.exe"C:\Users\Admin\AppData\Local\Temp\55ef12a981ff94f6c143d108d9dccec0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Roaming\WinSocket\66ef12a991ff94f7c143d109d9dccec0N.exeC:\Users\Admin\AppData\Roaming\WinSocket\66ef12a991ff94f7c143d109d9dccec0N.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1592
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\66ef12a991ff94f7c143d109d9dccec0N.exeC:\Users\Admin\AppData\Roaming\WinSocket\66ef12a991ff94f7c143d109d9dccec0N.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914KB
MD555ef12a981ff94f6c143d108d9dccec0
SHA125189bbd538829a1ffba64a0e436bc02192c7603
SHA2561d9ef62d36155fca044aa6984284ef38bcd734c0bc2efb6996c7ef55691a53a9
SHA5124aa34b0a566bd55184a5a29c3e81f536e919c609cf1f4bc3639f9d7efd0d8bf13e812f6a21ac315ddf9e8538996d5ea1da85b47f722e83bde3cd5c9d96308abc