Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 18:37
Behavioral task
behavioral1
Sample
3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8N.exe
Resource
win7-20240903-en
General
-
Target
3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8N.exe
-
Size
1022KB
-
MD5
db0bcbf0cdc5fa1db843866297bee020
-
SHA1
a9b1ed58311d19fec11b63d7078c86142d842dcd
-
SHA256
3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8
-
SHA512
5d63baf3fde823e3fbb5346f4d558d3659da0148f7234324b427b584b2964fe15d5debe3ba451bd1e3c9a732e2fa773539bbe4b3eda326911471ea5a0224ddfa
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm13J/NubaL:E5aIwC+Agr6S/FpJX
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023470-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/5008-15-0x00000000021E0000-0x0000000002209000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5008 3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8N.exe 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 5008 wrote to memory of 1256 5008 3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8N.exe 82 PID 5008 wrote to memory of 1256 5008 3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8N.exe 82 PID 5008 wrote to memory of 1256 5008 3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8N.exe 82 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 1256 wrote to memory of 2460 1256 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 83 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 PID 4492 wrote to memory of 2688 4492 3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8N.exe"C:\Users\Admin\AppData\Local\Temp\3f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Roaming\WinSocket\3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exeC:\Users\Admin\AppData\Roaming\WinSocket\3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2460
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exeC:\Users\Admin\AppData\Roaming\WinSocket\3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\3f99abec417d4c978df27ece26469f99f092e2f6cdf3ab922ba798dcde7819b9N.exe
Filesize1022KB
MD5db0bcbf0cdc5fa1db843866297bee020
SHA1a9b1ed58311d19fec11b63d7078c86142d842dcd
SHA2563f99abec416d4c867df26ece25459f88f082e2f5cdf3ab922ba697dcde6718b8
SHA5125d63baf3fde823e3fbb5346f4d558d3659da0148f7234324b427b584b2964fe15d5debe3ba451bd1e3c9a732e2fa773539bbe4b3eda326911471ea5a0224ddfa