Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 18:13
Behavioral task
behavioral1
Sample
044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88.exe
Resource
win7-20240729-en
General
-
Target
044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88.exe
-
Size
1.2MB
-
MD5
d804e70c7b5fd8d9c308278e03dc94a0
-
SHA1
965eb9430e085481861b927cc721a33bcc1d62e8
-
SHA256
044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88
-
SHA512
147d4ae3d763c97352077768c083419133d10ebf8a19a3eb9516ad8584891ff0628ad7ab2967e85278ecdb857a311435069d25c43c7dac3479edfc22b0687b84
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQ0+wCIygDsAUSTsU9+s8juCCCqR:E5aIwC+Agr6SNasrsFCZqR
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x00070000000234e7-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/5028-15-0x0000000002AB0000-0x0000000002AD9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe Token: SeTcbPrivilege 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5028 044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88.exe 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 3016 5028 044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88.exe 84 PID 5028 wrote to memory of 3016 5028 044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88.exe 84 PID 5028 wrote to memory of 3016 5028 044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88.exe 84 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 3016 wrote to memory of 4968 3016 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 86 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 440 wrote to memory of 4132 440 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 100 PID 1196 wrote to memory of 3940 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 110 PID 1196 wrote to memory of 3940 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 110 PID 1196 wrote to memory of 3940 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 110 PID 1196 wrote to memory of 3940 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 110 PID 1196 wrote to memory of 3940 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 110 PID 1196 wrote to memory of 3940 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 110 PID 1196 wrote to memory of 3940 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 110 PID 1196 wrote to memory of 3940 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 110 PID 1196 wrote to memory of 3940 1196 044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88.exe"C:\Users\Admin\AppData\Local\Temp\044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Roaming\WinSocket\044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exeC:\Users\Admin\AppData\Roaming\WinSocket\044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4968
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exeC:\Users\Admin\AppData\Roaming\WinSocket\044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4132
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exeC:\Users\Admin\AppData\Roaming\WinSocket\044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\044ce9c94930aa4f340192a77ea1df9c198a4360cece903679ecc604bfda9b99.exe
Filesize1.2MB
MD5d804e70c7b5fd8d9c308278e03dc94a0
SHA1965eb9430e085481861b927cc721a33bcc1d62e8
SHA256044ce8c84830aa4f340192a66ea1df8c197a4350cece903569ecc504bfda8b88
SHA512147d4ae3d763c97352077768c083419133d10ebf8a19a3eb9516ad8584891ff0628ad7ab2967e85278ecdb857a311435069d25c43c7dac3479edfc22b0687b84
-
Filesize
38KB
MD526783508e93270630498bb33db3b522b
SHA1230e90eb152ab36624b1a5564415ec66b036e232
SHA25697a04482ce1da2b28d143fde54f88870e60089ef835d98d42855e1c470cc5339
SHA512e727cd0cdef0793841bfa4405b78d3f0a182a8cee3719da4fec743f6e9bec2b3820dea2d13dd24a57d034e3750c3ca307a9c50986a85e442f6b7e79d9c394559