Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 18:25
Static task
static1
Behavioral task
behavioral1
Sample
989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe
Resource
win7-en-20211208
General
-
Target
989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe
-
Size
977KB
-
MD5
224e89cd4b5c4f8fdf2cff1c4dfe42e2
-
SHA1
c7371ce37c57a8725ddf4d551ecdbae8b097e638
-
SHA256
989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534
-
SHA512
36e5d09662a70dd123d02af8124376aaf4c91cc58b7bd9b1f0b5e3c9cc4ba25965ccc906264efe518593f76476a6828531dd911dfa80b631d80cc9b6af8c39bc
Malware Config
Extracted
trickbot
1000475
trgeu1
45.80.148.30:443
194.5.250.83:443
185.222.202.223:443
66.55.71.11:443
94.156.144.3:443
185.244.150.142:443
194.5.250.82:443
31.184.253.37:443
109.234.34.135:443
45.66.11.116:443
185.222.202.222:443
46.30.41.229:443
45.142.213.58:443
190.154.203.218:449
189.80.134.122:449
200.116.199.10:449
181.113.20.186:449
187.58.56.26:449
85.11.116.194:449
177.103.240.149:449
81.190.160.139:449
200.21.51.38:449
181.49.61.237:449
185.79.243.37:449
89.25.238.170:449
36.89.85.103:449
45.161.33.88:449
186.42.185.10:449
170.233.120.53:449
78.88.188.42:449
31.214.138.207:449
186.42.98.254:449
195.93.223.100:449
185.79.242.204:449
190.13.160.19:449
188.137.81.201:449
170.84.78.117:449
190.152.4.98:449
5.185.67.137:449
138.185.25.228:449
200.35.56.81:449
186.42.186.202:449
185.70.182.162:449
91.207.185.73:449
181.129.49.98:449
181.115.168.69:449
-
autorunControl:GetSystemInfoName:systeminfoName:pwgrab
Signatures
-
Trickbot x86 loader 2 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/584-66-0x00000000003D0000-0x00000000003FC000-memory.dmp trickbot_loader32 behavioral1/memory/756-74-0x00000000008E0000-0x000000000090E000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
вгббН.exeооиаа.exeвгббН.exepid process 584 вгббН.exe 268 ооиаа.exe 756 вгббН.exe -
Loads dropped DLL 3 IoCs
Processes:
989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exepid process 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 1004 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exeвгббН.exeвгббН.exepid process 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe 584 вгббН.exe 584 вгббН.exe 756 вгббН.exe 756 вгббН.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exeвгббН.exetaskeng.exeвгббН.exedescription pid process target process PID 1164 wrote to memory of 584 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe вгббН.exe PID 1164 wrote to memory of 584 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe вгббН.exe PID 1164 wrote to memory of 584 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe вгббН.exe PID 1164 wrote to memory of 584 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe вгббН.exe PID 1164 wrote to memory of 268 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe ооиаа.exe PID 1164 wrote to memory of 268 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe ооиаа.exe PID 1164 wrote to memory of 268 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe ооиаа.exe PID 1164 wrote to memory of 268 1164 989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe ооиаа.exe PID 584 wrote to memory of 636 584 вгббН.exe svchost.exe PID 584 wrote to memory of 636 584 вгббН.exe svchost.exe PID 584 wrote to memory of 636 584 вгббН.exe svchost.exe PID 584 wrote to memory of 636 584 вгббН.exe svchost.exe PID 584 wrote to memory of 636 584 вгббН.exe svchost.exe PID 584 wrote to memory of 636 584 вгббН.exe svchost.exe PID 1500 wrote to memory of 756 1500 taskeng.exe вгббН.exe PID 1500 wrote to memory of 756 1500 taskeng.exe вгббН.exe PID 1500 wrote to memory of 756 1500 taskeng.exe вгббН.exe PID 1500 wrote to memory of 756 1500 taskeng.exe вгббН.exe PID 756 wrote to memory of 1004 756 вгббН.exe svchost.exe PID 756 wrote to memory of 1004 756 вгббН.exe svchost.exe PID 756 wrote to memory of 1004 756 вгббН.exe svchost.exe PID 756 wrote to memory of 1004 756 вгббН.exe svchost.exe PID 756 wrote to memory of 1004 756 вгббН.exe svchost.exe PID 756 wrote to memory of 1004 756 вгббН.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe"C:\Users\Admin\AppData\Local\Temp\989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\ProgramData\вгббН.exe"C:\ProgramData\вгббН.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:636
-
C:\ProgramData\ооиаа.exe"C:\ProgramData\ооиаа.exe"2⤵
- Executes dropped EXE
PID:268
-
C:\Windows\system32\taskeng.exetaskeng.exe {A77B7431-BEAE-43B4-9E41-5BE72E45F3D5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Roaming\HomeLan\вгббН.exeC:\Users\Admin\AppData\Roaming\HomeLan\вгббН.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\вгббН.exeMD5
224e89cd4b5c4f8fdf2cff1c4dfe42e2
SHA1c7371ce37c57a8725ddf4d551ecdbae8b097e638
SHA256989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534
SHA51236e5d09662a70dd123d02af8124376aaf4c91cc58b7bd9b1f0b5e3c9cc4ba25965ccc906264efe518593f76476a6828531dd911dfa80b631d80cc9b6af8c39bc
-
C:\ProgramData\вгббН.exeMD5
224e89cd4b5c4f8fdf2cff1c4dfe42e2
SHA1c7371ce37c57a8725ddf4d551ecdbae8b097e638
SHA256989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534
SHA51236e5d09662a70dd123d02af8124376aaf4c91cc58b7bd9b1f0b5e3c9cc4ba25965ccc906264efe518593f76476a6828531dd911dfa80b631d80cc9b6af8c39bc
-
C:\ProgramData\ооиаа.exeMD5
2c24eaad1af80b2320c8eca59208b9e3
SHA1354a2eb38a26dc7b035b439385a572b5f7ec72ed
SHA256295238ae29bd534c46e1b8c65d0a7ef172d033e370024aea064cbd98b9e33c9c
SHA512b6bb8be3607927aea914d33ad3cec14b945a98b5d13cfb2bffe99b80ed8103c3e4df9bade45c5704e0be64ed2158292e98eea067cd21132539b9ca7ececf2519
-
C:\ProgramData\ооиаа.exeMD5
2c24eaad1af80b2320c8eca59208b9e3
SHA1354a2eb38a26dc7b035b439385a572b5f7ec72ed
SHA256295238ae29bd534c46e1b8c65d0a7ef172d033e370024aea064cbd98b9e33c9c
SHA512b6bb8be3607927aea914d33ad3cec14b945a98b5d13cfb2bffe99b80ed8103c3e4df9bade45c5704e0be64ed2158292e98eea067cd21132539b9ca7ececf2519
-
C:\Users\Admin\AppData\Roaming\HomeLan\вгббН.exeMD5
224e89cd4b5c4f8fdf2cff1c4dfe42e2
SHA1c7371ce37c57a8725ddf4d551ecdbae8b097e638
SHA256989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534
SHA51236e5d09662a70dd123d02af8124376aaf4c91cc58b7bd9b1f0b5e3c9cc4ba25965ccc906264efe518593f76476a6828531dd911dfa80b631d80cc9b6af8c39bc
-
C:\Users\Admin\AppData\Roaming\HomeLan\вгббН.exeMD5
224e89cd4b5c4f8fdf2cff1c4dfe42e2
SHA1c7371ce37c57a8725ddf4d551ecdbae8b097e638
SHA256989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534
SHA51236e5d09662a70dd123d02af8124376aaf4c91cc58b7bd9b1f0b5e3c9cc4ba25965ccc906264efe518593f76476a6828531dd911dfa80b631d80cc9b6af8c39bc
-
\ProgramData\вгббН.exeMD5
224e89cd4b5c4f8fdf2cff1c4dfe42e2
SHA1c7371ce37c57a8725ddf4d551ecdbae8b097e638
SHA256989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534
SHA51236e5d09662a70dd123d02af8124376aaf4c91cc58b7bd9b1f0b5e3c9cc4ba25965ccc906264efe518593f76476a6828531dd911dfa80b631d80cc9b6af8c39bc
-
\ProgramData\вгббН.exeMD5
224e89cd4b5c4f8fdf2cff1c4dfe42e2
SHA1c7371ce37c57a8725ddf4d551ecdbae8b097e638
SHA256989109101e065aaa1e86b67a3f4629229047ce2c5bf39da53f775e54ee888534
SHA51236e5d09662a70dd123d02af8124376aaf4c91cc58b7bd9b1f0b5e3c9cc4ba25965ccc906264efe518593f76476a6828531dd911dfa80b631d80cc9b6af8c39bc
-
\ProgramData\ооиаа.exeMD5
2c24eaad1af80b2320c8eca59208b9e3
SHA1354a2eb38a26dc7b035b439385a572b5f7ec72ed
SHA256295238ae29bd534c46e1b8c65d0a7ef172d033e370024aea064cbd98b9e33c9c
SHA512b6bb8be3607927aea914d33ad3cec14b945a98b5d13cfb2bffe99b80ed8103c3e4df9bade45c5704e0be64ed2158292e98eea067cd21132539b9ca7ececf2519
-
memory/268-67-0x0000000000080000-0x0000000000088000-memory.dmpFilesize
32KB
-
memory/268-69-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/584-66-0x00000000003D0000-0x00000000003FC000-memory.dmpFilesize
176KB
-
memory/636-70-0x00000000000F0000-0x000000000010E000-memory.dmpFilesize
120KB
-
memory/756-74-0x00000000008E0000-0x000000000090E000-memory.dmpFilesize
184KB
-
memory/1004-76-0x0000000000060000-0x000000000007E000-memory.dmpFilesize
120KB
-
memory/1164-54-0x0000000076491000-0x0000000076493000-memory.dmpFilesize
8KB