Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 02:56
Behavioral task
behavioral1
Sample
ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exe
Resource
win7-20240903-en
General
-
Target
ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exe
-
Size
1011KB
-
MD5
69137dce942fa329b047640f463d2fd1
-
SHA1
a56e738505b2b03028b4bd48c31c42d43bebb129
-
SHA256
ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112
-
SHA512
04ba498b564710ae6ea0cbf3d604e5cc49386c7379a702ba1758b477d8db2d97895e30ff4538b8884185f7ebcecba06a3dbe50f9fbeb3074ba417c207e83ca74
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm13J/NuK:E5aIwC+Agr6S/FpJ3
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023485-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2968-15-0x0000000002A70000-0x0000000002A99000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exepid Process 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exedescription pid Process Token: SeTcbPrivilege 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe Token: SeTcbPrivilege 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exepid Process 2968 ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exe 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exedescription pid Process procid_target PID 2968 wrote to memory of 4504 2968 ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exe 84 PID 2968 wrote to memory of 4504 2968 ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exe 84 PID 2968 wrote to memory of 4504 2968 ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exe 84 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 4504 wrote to memory of 3924 4504 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 86 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 3240 wrote to memory of 3336 3240 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 98 PID 5104 wrote to memory of 3568 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 100 PID 5104 wrote to memory of 3568 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 100 PID 5104 wrote to memory of 3568 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 100 PID 5104 wrote to memory of 3568 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 100 PID 5104 wrote to memory of 3568 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 100 PID 5104 wrote to memory of 3568 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 100 PID 5104 wrote to memory of 3568 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 100 PID 5104 wrote to memory of 3568 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 100 PID 5104 wrote to memory of 3568 5104 ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exe"C:\Users\Admin\AppData\Local\Temp\ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\WinSocket\ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3924
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3336
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exeC:\Users\Admin\AppData\Roaming\WinSocket\ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\ed2f06ef91ec9f262d91ef09e4de9167477931839a0cdd83ab9372a27d206112.exe
Filesize1011KB
MD569137dce942fa329b047640f463d2fd1
SHA1a56e738505b2b03028b4bd48c31c42d43bebb129
SHA256ed2f05ef91ec9f252d81ef09e4de8156466931739a0cdd73ab9362a26d205112
SHA51204ba498b564710ae6ea0cbf3d604e5cc49386c7379a702ba1758b477d8db2d97895e30ff4538b8884185f7ebcecba06a3dbe50f9fbeb3074ba417c207e83ca74
-
Filesize
21KB
MD5ca41d599b049bdab455c0e27d0ea881a
SHA1149970fb0915f2d783953197fdda3cc47a266f16
SHA25641d6be27a61918ac638d0fa2997f473dba23388220227da83d7009c029db4068
SHA512aae6055e92a5277a9a1d6279ca42d8d2538aec37a4f4ca64d84cd8a8c4baf34dedc72bc485c75e93d4fafa442c5c6097288cfa00d64ca81cfe993f220d819fef