Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    24-08-2020 22:33

General

  • Target

    127661.exe

  • Size

    375KB

  • MD5

    309c240336952e3a6afe08f91581aa76

  • SHA1

    7cc257d1dc641c5fc312c7694a1a7be7ce31cb46

  • SHA256

    621d7c1d19ccbaa8d56dbcb37e46f4437fa425ce92895acd87a6df9710f8b391

  • SHA512

    a7e68157c9d9e6a317fa5a898cf1b96bd884132e4634fecd495af74d5e40b72f54a85446730a0a0ac8379039146f1840229e420c5b7dd64b1eca8be0b09fb104

Malware Config

Extracted

Family

trickbot

Version

1000098

Botnet

mac1

C2

79.106.41.9:449

94.250.252.146:443

62.109.18.206:443

62.109.26.193:443

78.24.223.50:443

94.250.252.162:443

92.53.78.209:443

92.53.66.115:443

62.109.16.70:443

62.109.23.229:443

62.109.17.100:443

82.146.47.221:443

195.133.144.43:443

194.87.92.217:443

95.213.194.234:443

195.133.147.44:443

194.87.238.149:443

78.155.206.154:443

185.80.130.195:443

94.250.252.168:443

Attributes
  • autorun
    Control:GetSystemInfo
    Name:systeminfo
    Name:injectDll
ecc_pubkey.base64

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Windows security bypass 2 TTPs
  • Executes dropped EXE 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1416 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\127661.exe
    "C:\Users\Admin\AppData\Local\Temp\127661.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Users\Admin\AppData\Roaming\services\237772.exe
      C:\Users\Admin\AppData\Roaming\services\237772.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:504
      • C:\Windows\SYSTEM32\svchost.exe
        svchost.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1068
  • C:\Users\Admin\AppData\Roaming\services\237772.exe
    C:\Users\Admin\AppData\Roaming\services\237772.exe
    1⤵
    • Executes dropped EXE
    PID:3016
    • C:\Windows\system32\svchost.exe
      svchost.exe
      2⤵
      • Modifies data under HKEY_USERS
      PID:756
  • C:\Users\Admin\AppData\Roaming\services\237772.exe
    C:\Users\Admin\AppData\Roaming\services\237772.exe
    1⤵
    • Executes dropped EXE
    PID:1768
    • C:\Windows\system32\svchost.exe
      svchost.exe
      2⤵
        PID:3684

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\services\237772.exe

    • C:\Users\Admin\AppData\Roaming\services\237772.exe

    • C:\Users\Admin\AppData\Roaming\services\237772.exe

    • C:\Users\Admin\AppData\Roaming\services\237772.exe

    • memory/504-1-0x0000000000000000-mapping.dmp

    • memory/504-4-0x00000000006A1000-0x00000000006A2000-memory.dmp

      Filesize

      4KB

    • memory/756-9-0x0000000000000000-mapping.dmp

    • memory/904-0-0x0000000000700000-0x0000000000701000-memory.dmp

      Filesize

      4KB

    • memory/1068-6-0x0000000140000000-0x0000000140022000-memory.dmp

      Filesize

      136KB

    • memory/1068-5-0x0000000000000000-mapping.dmp

    • memory/1768-12-0x00000000007F4000-0x00000000007F7000-memory.dmp

      Filesize

      12KB

    • memory/3016-8-0x00000000007A4000-0x00000000007A7000-memory.dmp

      Filesize

      12KB

    • memory/3684-13-0x0000000000000000-mapping.dmp