Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10_x64 -
resource
win10v200410 -
submitted
21-04-2020 19:24
Static task
static1
Behavioral task
behavioral1
Sample
89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe
Resource
win7v200410
General
-
Target
89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe
-
Size
860KB
-
MD5
8f56b7fb84c9688568426525d8d0e785
-
SHA1
f6880dee86deb6d9ec0200293e37086c6970c40d
-
SHA256
89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906
-
SHA512
1980560746c8ddb4e2ff72556a5187cc56f33e12bbd8fb3e0853b1e0e1e2a406aab0ad54c9b842675a1391b6b31cb1529cce0dc7390babe3315854736f2719ed
Malware Config
Extracted
trickbot
1000479
trgt98888
192.3.104.46:443
23.94.233.210:443
172.82.152.126:443
192.3.247.11:443
202.29.215.114:449
-
autorunControl:GetSystemInfoName:systeminfoName:pwgrab
Signatures
-
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe있서래처길모고른든.exe있서래처길모고른든.exepid process 4040 89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe 4040 89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe 3568 있서래처길모고른든.exe 3568 있서래처길모고른든.exe 2668 있서래처길모고른든.exe 2668 있서래처길모고른든.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe있서래처길모고른든.exe있서래처길모고른든.exedescription pid process target process PID 4040 wrote to memory of 3568 4040 89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe 있서래처길모고른든.exe PID 4040 wrote to memory of 3568 4040 89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe 있서래처길모고른든.exe PID 4040 wrote to memory of 3568 4040 89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe 있서래처길모고른든.exe PID 3568 wrote to memory of 1960 3568 있서래처길모고른든.exe svchost.exe PID 3568 wrote to memory of 1960 3568 있서래처길모고른든.exe svchost.exe PID 3568 wrote to memory of 1960 3568 있서래처길모고른든.exe svchost.exe PID 3568 wrote to memory of 1960 3568 있서래처길모고른든.exe svchost.exe PID 2668 wrote to memory of 1748 2668 있서래처길모고른든.exe svchost.exe PID 2668 wrote to memory of 1748 2668 있서래처길모고른든.exe svchost.exe PID 2668 wrote to memory of 1748 2668 있서래처길모고른든.exe svchost.exe PID 2668 wrote to memory of 1748 2668 있서래처길모고른든.exe svchost.exe -
Executes dropped EXE 2 IoCs
Processes:
있서래처길모고른든.exe있서래처길모고른든.exepid process 3568 있서래처길모고른든.exe 2668 있서래처길모고른든.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 1748 svchost.exe -
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3568-2-0x00000000006E0000-0x000000000070D000-memory.dmp trickbot_loader32 -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe"C:\Users\Admin\AppData\Local\Temp\89f5e19edd672f818eab999513a07020120c6453c83c88abff02977b7c5f1906.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\있서래처길모고른든.exe"C:\ProgramData\있서래처길모고른든.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\NuiGet\있서래처길모고른든.exeC:\Users\Admin\AppData\Roaming\NuiGet\있서래처길모고른든.exe1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\있서래처길모고른든.exe
-
C:\ProgramData\있서래처길모고른든.exe
-
C:\Users\Admin\AppData\Roaming\NuiGet\있서래처길모고른든.exe
-
C:\Users\Admin\AppData\Roaming\NuiGet\있서래처길모고른든.exe
-
memory/3568-2-0x00000000006E0000-0x000000000070D000-memory.dmpFilesize
180KB