Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 05:08
Behavioral task
behavioral1
Sample
6aa56c8f915c15b7d4a9aab9e30af870N.exe
Resource
win7-20240704-en
General
-
Target
6aa56c8f915c15b7d4a9aab9e30af870N.exe
-
Size
861KB
-
MD5
6aa56c8f915c15b7d4a9aab9e30af870
-
SHA1
66cd3ad17fa323d51f00ce852cbd3266b28c42ad
-
SHA256
4a70b3600618e9f49c0c952e7a09115e57c72d8c304384363d0dbab46eef2f3a
-
SHA512
c0357c25a4d3b8a32b5baadd3708787eb6486f5dd185b6b42c9431cc9bfbc02ee184f528dcfb102dbd91a6fd1346f21257b5e2a7dd3ae65beaa729c1eabf8cc2
-
SSDEEP
12288:zJB0lh5aILwtFPCfmAUtFC6NXbv+GEBQGCsksQjn6YHldGm1ufSD8Gl/ht:zQ5aILMCfmAUjzX6xQGCZLFdGm13J/ht
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002343a-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4368-15-0x0000000002160000-0x0000000002189000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6aa56c8f915c15b7d4a9aab9e30af870N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aa67c9f916c16b8d4a9aab9e30af980N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aa67c9f916c16b8d4a9aab9e30af980N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4368 6aa56c8f915c15b7d4a9aab9e30af870N.exe 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 4368 wrote to memory of 5084 4368 6aa56c8f915c15b7d4a9aab9e30af870N.exe 85 PID 4368 wrote to memory of 5084 4368 6aa56c8f915c15b7d4a9aab9e30af870N.exe 85 PID 4368 wrote to memory of 5084 4368 6aa56c8f915c15b7d4a9aab9e30af870N.exe 85 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 5084 wrote to memory of 1124 5084 7aa67c9f916c16b8d4a9aab9e30af980N.exe 87 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 PID 4976 wrote to memory of 748 4976 7aa67c9f916c16b8d4a9aab9e30af980N.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aa56c8f915c15b7d4a9aab9e30af870N.exe"C:\Users\Admin\AppData\Local\Temp\6aa56c8f915c15b7d4a9aab9e30af870N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Roaming\WinSocket\7aa67c9f916c16b8d4a9aab9e30af980N.exeC:\Users\Admin\AppData\Roaming\WinSocket\7aa67c9f916c16b8d4a9aab9e30af980N.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1124
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\7aa67c9f916c16b8d4a9aab9e30af980N.exeC:\Users\Admin\AppData\Roaming\WinSocket\7aa67c9f916c16b8d4a9aab9e30af980N.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
861KB
MD56aa56c8f915c15b7d4a9aab9e30af870
SHA166cd3ad17fa323d51f00ce852cbd3266b28c42ad
SHA2564a70b3600618e9f49c0c952e7a09115e57c72d8c304384363d0dbab46eef2f3a
SHA512c0357c25a4d3b8a32b5baadd3708787eb6486f5dd185b6b42c9431cc9bfbc02ee184f528dcfb102dbd91a6fd1346f21257b5e2a7dd3ae65beaa729c1eabf8cc2