Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 13:09
Behavioral task
behavioral1
Sample
c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe
Resource
win7-20240708-en
General
-
Target
c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe
-
Size
1.2MB
-
MD5
a75e5ec8cb970751e03e89715d9376dd
-
SHA1
757552baa41f16654dabeb2a0931ce27b65c4426
-
SHA256
c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd
-
SHA512
b9d35cd5fb15c42741e0e05f8e7bd99d17468ec4d36e3297e37edbe6162b84a23327d026b98d3279c354c0f3faa8735410fc342a8694dc1c5c820196139b9f5e
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtjmssdqex1hl+dZXM:E5aIwC+Agr6StYCXM
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule behavioral2/files/0x00070000000234b4-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3592-16-0x0000000002330000-0x0000000002359000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exepid Process 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exec67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exedescription pid Process Token: SeTcbPrivilege 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe Token: SeTcbPrivilege 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exepid Process 3592 c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exec78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exedescription pid Process procid_target PID 3592 wrote to memory of 2332 3592 c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe 83 PID 3592 wrote to memory of 2332 3592 c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe 83 PID 3592 wrote to memory of 2332 3592 c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe 83 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 2332 wrote to memory of 2084 2332 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 84 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 620 wrote to memory of 3372 620 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 95 PID 3764 wrote to memory of 2488 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 97 PID 3764 wrote to memory of 2488 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 97 PID 3764 wrote to memory of 2488 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 97 PID 3764 wrote to memory of 2488 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 97 PID 3764 wrote to memory of 2488 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 97 PID 3764 wrote to memory of 2488 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 97 PID 3764 wrote to memory of 2488 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 97 PID 3764 wrote to memory of 2488 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 97 PID 3764 wrote to memory of 2488 3764 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe"C:\Users\Admin\AppData\Local\Temp\c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exeC:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2084
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exeC:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3372
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exeC:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe
Filesize1.2MB
MD5a75e5ec8cb970751e03e89715d9376dd
SHA1757552baa41f16654dabeb2a0931ce27b65c4426
SHA256c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd
SHA512b9d35cd5fb15c42741e0e05f8e7bd99d17468ec4d36e3297e37edbe6162b84a23327d026b98d3279c354c0f3faa8735410fc342a8694dc1c5c820196139b9f5e
-
Filesize
36KB
MD566a4c2c40fa5c5c01bcdcf17e95a0666
SHA1a7970119e973db91ab90b917f7ed025e6fd10618
SHA2568af7c72c20c0b39d27eeab8ae561563a98c3b94ec57851c27f98b1b54c8a86f4
SHA512df0eec6bca8a048f4f4f4168b0b7ca0e1cf09281a260e0f09a14c2cba03449f3ae85ac9e1f8d207ebaddc1a2776c5768fc7e0ad290bf6c528d852629193b0f5a