Analysis
-
max time kernel
123s -
max time network
155s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 21:59
Static task
static1
Behavioral task
behavioral1
Sample
ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exe
Resource
win7-en-20211208
General
-
Target
ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exe
-
Size
981KB
-
MD5
959f6e21eddb767364245c1e1ea41aa7
-
SHA1
23e5e8d180d8d7bfaf9cf469aa104ab0ce6a5ee6
-
SHA256
ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d
-
SHA512
6629870467a5dc2f2e6cb76852b9c8f79d8205ae144322737aea23381e50ca694b74959198ece04b6d00396296d983ba87aed52ca372d47fb55e977f694c0d80
Malware Config
Extracted
trickbot
1000477
trg88889
37.44.212.148:443
185.65.202.127:443
193.37.212.246:443
193.124.191.243:443
31.148.99.63:443
94.103.91.61:443
203.23.128.179:443
179.43.147.72:443
93.123.73.192:443
51.89.115.120:443
144.91.76.214:443
46.21.153.81:443
194.5.250.98:443
190.154.203.218:449
178.183.150.169:449
200.116.199.10:449
181.113.20.186:449
187.58.56.26:449
85.11.116.194:449
177.103.240.149:449
81.190.160.139:449
200.21.51.38:449
181.49.61.237:449
46.174.235.36:449
91.232.52.187:449
36.89.85.103:449
31.128.13.45:449
186.42.185.10:449
170.233.120.53:449
89.228.243.148:449
31.214.138.207:449
186.42.98.254:449
195.93.223.100:449
181.112.52.26:449
190.13.160.19:449
186.47.122.182:449
186.71.150.23:449
190.152.4.98:449
170.82.156.53:449
131.161.253.190:449
181.113.114.50:449
186.47.121.58:449
185.70.182.162:449
200.127.121.99:449
45.235.213.126:449
-
autorunControl:GetSystemInfoName:systeminfoName:pwgrab
Signatures
-
Trickbot x86 loader 2 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/648-120-0x00000000021A0000-0x00000000021CE000-memory.dmp trickbot_loader32 behavioral2/memory/648-122-0x0000000002160000-0x000000000218C000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
すすのは抱べも私.exepid process 648 すすのは抱べも私.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exeすすのは抱べも私.exepid process 3784 ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exe 3784 ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exe 648 すすのは抱べも私.exe 648 すすのは抱べも私.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exeすすのは抱べも私.exedescription pid process target process PID 3784 wrote to memory of 648 3784 ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exe すすのは抱べも私.exe PID 3784 wrote to memory of 648 3784 ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exe すすのは抱べも私.exe PID 3784 wrote to memory of 648 3784 ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exe すすのは抱べも私.exe PID 648 wrote to memory of 1256 648 すすのは抱べも私.exe svchost.exe PID 648 wrote to memory of 1256 648 すすのは抱べも私.exe svchost.exe PID 648 wrote to memory of 1256 648 すすのは抱べも私.exe svchost.exe PID 648 wrote to memory of 1256 648 すすのは抱べも私.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exe"C:\Users\Admin\AppData\Local\Temp\ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\ProgramData\すすのは抱べも私.exe"C:\ProgramData\すすのは抱べも私.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1256
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
959f6e21eddb767364245c1e1ea41aa7
SHA123e5e8d180d8d7bfaf9cf469aa104ab0ce6a5ee6
SHA256ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d
SHA5126629870467a5dc2f2e6cb76852b9c8f79d8205ae144322737aea23381e50ca694b74959198ece04b6d00396296d983ba87aed52ca372d47fb55e977f694c0d80
-
MD5
959f6e21eddb767364245c1e1ea41aa7
SHA123e5e8d180d8d7bfaf9cf469aa104ab0ce6a5ee6
SHA256ce6acf274744f0f200528105f3beead449d07197eb1e66b43a2616168e0b4d8d
SHA5126629870467a5dc2f2e6cb76852b9c8f79d8205ae144322737aea23381e50ca694b74959198ece04b6d00396296d983ba87aed52ca372d47fb55e977f694c0d80