Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 04:56
General
-
Target
c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe
-
Size
1.2MB
-
MD5
a75e5ec8cb970751e03e89715d9376dd
-
SHA1
757552baa41f16654dabeb2a0931ce27b65c4426
-
SHA256
c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd
-
SHA512
b9d35cd5fb15c42741e0e05f8e7bd99d17468ec4d36e3297e37edbe6162b84a23327d026b98d3279c354c0f3faa8735410fc342a8694dc1c5c820196139b9f5e
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQtjmssdqex1hl+dZXM:E5aIwC+Agr6StYCXM
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7d-21.dat family_kpot -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2352-15-0x0000000002FC0000-0x0000000002FE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2352 c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2352 wrote to memory of 3924 2352 c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe 85 PID 2352 wrote to memory of 3924 2352 c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe 85 PID 2352 wrote to memory of 3924 2352 c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe 85 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 PID 3924 wrote to memory of 3540 3924 c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe"C:\Users\Admin\AppData\Local\Temp\c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exeC:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\c78862926827fbb0bde89731f71689a1a94a049cae434a922e23dfe790ac11cd.exe
Filesize1.2MB
MD5a75e5ec8cb970751e03e89715d9376dd
SHA1757552baa41f16654dabeb2a0931ce27b65c4426
SHA256c67752825726fbb0bde78631f61578a1a84a048cae434a822e23dfe680ac11cd
SHA512b9d35cd5fb15c42741e0e05f8e7bd99d17468ec4d36e3297e37edbe6162b84a23327d026b98d3279c354c0f3faa8735410fc342a8694dc1c5c820196139b9f5e
-
Filesize
319KB
MD5ba3c184aa3132b4f1bf93bac02312194
SHA1277f2aa415e99bc87500268359ddebd859023b6d
SHA25623f7e1d67f330ca98957d7813e5344cc3dde4e7faf8d46fcb3df51cd4cd65459
SHA5124ddefe785c06e7d2f863d8576dda4b2fdaf7ae25d3a59dd2036ebf6067484e4f4afa225b533c6a68d996472f27fbb98afbf167b9ec97e57d9401f9fb22bde873
-
Filesize
2KB
MD5a5cf7a2aa849e00f7fd0d5a4a0ce9d6e
SHA170209744e4736fa6835201e9600d73e852f773b9
SHA256bf7e3011458308fc1d0998694d276abf22873db580b312d509e56c4bab7ff6ef
SHA5125126747cbf47aec3fd93be85331d3f21c586e6a480ee160eab8bbadea2149879f3cdcd7fb76892af3d01f63079d3b29ee5a5af723ed1114a255fe4f0c70409fd
-
Filesize
332KB
MD5f34462739b0bfa9d0abf4b70d0315f8d
SHA1cb3ff25d4650cf8ba09859ea30a70768f529d69c
SHA256d8b9c5262af35926b04c10842ff9eda8d5e11767daed270f61c29bfc10e76e0f
SHA5129fb21023ae3485f74501b07b5e826f6338e8e06a6232613530749bcbaa3274309f47c2b8cef788e04b4bb707ea49e942fe60ba24743d6511021fb5a7fef37dec
-
Filesize
2KB
MD528cfd7e341c27be247dfd17c526c873b
SHA1a2c7aa1983caf1f8004fc75ce86a419963d356ac
SHA256386206a3feda91f77a582491e2d3ca6d40832abe269d92c1fa8424b71c718cd3
SHA51246d1d571ea0380923983e353fdd38ce78bfd77b58ff4aa5d336d59be7acfa0167c1250e0dcda64cc6bd42790a5d15dded2b854425632503a742b078b36e48568