Analysis
-
max time kernel
137s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 22:48
Behavioral task
behavioral1
Sample
75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056.exe
Resource
win7-20240903-en
General
-
Target
75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056.exe
-
Size
991KB
-
MD5
46c6fcd29dd1a1561bea9e8e5598f6d5
-
SHA1
33ff7809d4d3bca6ff4d795720397c29a79ae4de
-
SHA256
75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056
-
SHA512
215cd0c10ad2e7131c893fe7c1c81a6a22ba6ca0c54d4fb3502cbf95c05e8113b74c634c7efd6deb44382c1a1a93df7c48c110f9dbdc00ba0c8861fe0ce12b67
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm13J/NuV5:E5aIwC+Agr6S/FpJo5
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x000700000002360b-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/4568-15-0x00000000022F0000-0x0000000002319000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe Token: SeTcbPrivilege 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4568 75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056.exe 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 2436 4568 75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056.exe 92 PID 4568 wrote to memory of 2436 4568 75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056.exe 92 PID 4568 wrote to memory of 2436 4568 75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056.exe 92 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2436 wrote to memory of 1288 2436 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 93 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2608 wrote to memory of 2316 2608 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 107 PID 2620 wrote to memory of 3984 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 109 PID 2620 wrote to memory of 3984 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 109 PID 2620 wrote to memory of 3984 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 109 PID 2620 wrote to memory of 3984 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 109 PID 2620 wrote to memory of 3984 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 109 PID 2620 wrote to memory of 3984 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 109 PID 2620 wrote to memory of 3984 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 109 PID 2620 wrote to memory of 3984 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 109 PID 2620 wrote to memory of 3984 2620 86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056.exe"C:\Users\Admin\AppData\Local\Temp\75853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Roaming\WinSocket\86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exeC:\Users\Admin\AppData\Roaming\WinSocket\86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1288
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3924,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=2508 /prefetch:81⤵PID:4320
-
C:\Users\Admin\AppData\Roaming\WinSocket\86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exeC:\Users\Admin\AppData\Roaming\WinSocket\86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2316
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exeC:\Users\Admin\AppData\Roaming\WinSocket\86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\86963f9069828aaedf191bf9a2e7a12912092799eba77827776991cdad90c067.exe
Filesize991KB
MD546c6fcd29dd1a1561bea9e8e5598f6d5
SHA133ff7809d4d3bca6ff4d795720397c29a79ae4de
SHA25675853f9059727aaedf181bf8a2e6a12812082689eba66726665991cdad90c056
SHA512215cd0c10ad2e7131c893fe7c1c81a6a22ba6ca0c54d4fb3502cbf95c05e8113b74c634c7efd6deb44382c1a1a93df7c48c110f9dbdc00ba0c8861fe0ce12b67
-
Filesize
36KB
MD54667e86127672a75b318704b99313164
SHA1ccb08ec3260b27622c722389615cfa5a64ef7067
SHA2564458bdc681b325c46b643acab720bf8c6e501e6af6feab68ba8bd7ea9c91f443
SHA5127753cc3371d8ca3bc35c8bf8e6479fce300b0873ce52234f23f5d4ed17c0c3fea8d345e62a3ae11fa2edffc49003707141696cd07e58617fb9a44a48d9c05395