Analysis
-
max time kernel
55s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 03:48
Static task
static1
Behavioral task
behavioral1
Sample
0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe
Resource
win10v2004-20220414-en
General
-
Target
0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe
-
Size
546KB
-
MD5
9ed548302bc24b6c5a09e397af9d9b77
-
SHA1
01220ee53b97aabf87d73c276c28bc2ecd4ccb1c
-
SHA256
0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300
-
SHA512
94b9a42ea4f4c88a1d1ebfa56a73c560122c09dc6b81a3ea3c1d01f44efeb727843bbebf75f64f79045e7ecbc7a38f4855308fcf7261da4b0e15c45315487ee8
Malware Config
Extracted
trickbot
1000317
lib374
107.175.127.149:443
24.247.182.240:449
108.174.120.172:449
107.174.34.202:443
24.247.182.29:449
24.247.182.179:449
97.87.175.152:449
198.46.131.164:443
74.132.135.120:449
198.46.160.217:443
71.94.101.25:443
24.247.182.225:449
192.3.52.107:443
74.140.160.33:449
65.31.241.133:449
140.190.54.187:449
24.247.181.226:449
108.160.196.130:449
23.94.36.143:443
24.247.182.174:449
108.174.60.161:443
75.108.123.165:449
72.189.124.41:449
105.27.171.234:449
172.222.97.179:449
72.241.62.188:449
198.46.198.241:443
199.227.126.250:449
97.87.172.0:449
94.232.20.113:443
24.247.182.159:449
47.49.168.50:443
64.128.175.37:449
24.227.222.4:449
-
autorunControl:GetSystemInfoName:systeminfoName:injectDllName:pwgrab
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/2016-55-0x00000000005A0000-0x00000000005E0000-memory.dmp trickbot_loader32 behavioral1/memory/2016-67-0x00000000005A0000-0x00000000005E0000-memory.dmp trickbot_loader32 behavioral1/memory/948-98-0x0000000000490000-0x00000000004D0000-memory.dmp trickbot_loader32 behavioral1/memory/948-111-0x0000000000490000-0x00000000004D0000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exepid process 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 2 IoCs
Processes:
0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exepid process 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exepowershell.exepid process 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe 628 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 628 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.execmd.execmd.execmd.exe0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exedescription pid process target process PID 2016 wrote to memory of 1688 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 1688 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 1688 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 1688 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 828 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 828 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 828 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 828 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 620 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 620 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 620 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 620 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe cmd.exe PID 2016 wrote to memory of 948 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe PID 2016 wrote to memory of 948 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe PID 2016 wrote to memory of 948 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe PID 2016 wrote to memory of 948 2016 0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe PID 828 wrote to memory of 932 828 cmd.exe sc.exe PID 1688 wrote to memory of 1984 1688 cmd.exe sc.exe PID 828 wrote to memory of 932 828 cmd.exe sc.exe PID 1688 wrote to memory of 1984 1688 cmd.exe sc.exe PID 828 wrote to memory of 932 828 cmd.exe sc.exe PID 1688 wrote to memory of 1984 1688 cmd.exe sc.exe PID 828 wrote to memory of 932 828 cmd.exe sc.exe PID 1688 wrote to memory of 1984 1688 cmd.exe sc.exe PID 620 wrote to memory of 628 620 cmd.exe powershell.exe PID 620 wrote to memory of 628 620 cmd.exe powershell.exe PID 620 wrote to memory of 628 620 cmd.exe powershell.exe PID 620 wrote to memory of 628 620 cmd.exe powershell.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe PID 948 wrote to memory of 368 948 0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe"C:\Users\Admin\AppData\Local\Temp\0b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\WinDefrag\0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exeC:\Users\Admin\AppData\Roaming\WinDefrag\0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-790309383-526510583-3802439154-1000\0f5007522459c86e95ffcc62f32308f1_5a8ed3ac-cae1-4e8b-9fd6-2d374700adefFilesize
1KB
MD57b2831abb1199e8616cbd2f8f5b6306f
SHA1ba5b86de6709fd5ae899491a2ab2009bf9ba822d
SHA256cb4be9b152d30f2c324cb94230187b170cb0bb990dbe0201ce5c1eb96e5258db
SHA51235f36bf73763b3693881f0158f070daf557cadcad6ddddb138642b609b08445fcf1bf370d63648defd2fcec91c100ceb5760199f0e862f9c7b5d74b800b6439a
-
C:\Users\Admin\AppData\Roaming\WinDefrag\0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exeFilesize
546KB
MD59ed548302bc24b6c5a09e397af9d9b77
SHA101220ee53b97aabf87d73c276c28bc2ecd4ccb1c
SHA2560b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300
SHA51294b9a42ea4f4c88a1d1ebfa56a73c560122c09dc6b81a3ea3c1d01f44efeb727843bbebf75f64f79045e7ecbc7a38f4855308fcf7261da4b0e15c45315487ee8
-
\Users\Admin\AppData\Roaming\WinDefrag\0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exeFilesize
546KB
MD59ed548302bc24b6c5a09e397af9d9b77
SHA101220ee53b97aabf87d73c276c28bc2ecd4ccb1c
SHA2560b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300
SHA51294b9a42ea4f4c88a1d1ebfa56a73c560122c09dc6b81a3ea3c1d01f44efeb727843bbebf75f64f79045e7ecbc7a38f4855308fcf7261da4b0e15c45315487ee8
-
\Users\Admin\AppData\Roaming\WinDefrag\0b3dd23c26218143b998c76d091034fdd9040cdb62f790140da989f721bcd300.exeFilesize
546KB
MD59ed548302bc24b6c5a09e397af9d9b77
SHA101220ee53b97aabf87d73c276c28bc2ecd4ccb1c
SHA2560b3dd23c25217143b997c65d091034fdd9040cdb52f690140da979f621bcd300
SHA51294b9a42ea4f4c88a1d1ebfa56a73c560122c09dc6b81a3ea3c1d01f44efeb727843bbebf75f64f79045e7ecbc7a38f4855308fcf7261da4b0e15c45315487ee8
-
memory/368-105-0x0000000140000000-0x0000000140039000-memory.dmpFilesize
228KB
-
memory/368-103-0x0000000000000000-mapping.dmp
-
memory/620-58-0x0000000000000000-mapping.dmp
-
memory/628-77-0x0000000074530000-0x0000000074765000-memory.dmpFilesize
2.2MB
-
memory/628-81-0x0000000071450000-0x0000000071986000-memory.dmpFilesize
5.2MB
-
memory/628-95-0x0000000073D50000-0x0000000073DEC000-memory.dmpFilesize
624KB
-
memory/628-94-0x0000000071450000-0x0000000071986000-memory.dmpFilesize
5.2MB
-
memory/628-65-0x0000000000000000-mapping.dmp
-
memory/628-93-0x00000000747B0000-0x00000000747D5000-memory.dmpFilesize
148KB
-
memory/628-68-0x0000000073E80000-0x000000007442B000-memory.dmpFilesize
5.7MB
-
memory/628-69-0x0000000072F10000-0x0000000073A08000-memory.dmpFilesize
11.0MB
-
memory/628-70-0x0000000072770000-0x0000000072F0C000-memory.dmpFilesize
7.6MB
-
memory/628-71-0x0000000074830000-0x00000000748B1000-memory.dmpFilesize
516KB
-
memory/628-72-0x0000000071C00000-0x000000007247A000-memory.dmpFilesize
8.5MB
-
memory/628-73-0x00000000747E0000-0x000000007482B000-memory.dmpFilesize
300KB
-
memory/628-74-0x00000000747B0000-0x00000000747D5000-memory.dmpFilesize
148KB
-
memory/628-75-0x0000000073DF0000-0x0000000073E75000-memory.dmpFilesize
532KB
-
memory/628-76-0x0000000073D50000-0x0000000073DEC000-memory.dmpFilesize
624KB
-
memory/628-92-0x0000000071C00000-0x000000007247A000-memory.dmpFilesize
8.5MB
-
memory/628-78-0x0000000071A60000-0x0000000071BFE000-memory.dmpFilesize
1.6MB
-
memory/628-79-0x0000000071990000-0x0000000071A53000-memory.dmpFilesize
780KB
-
memory/628-80-0x0000000074500000-0x000000007452D000-memory.dmpFilesize
180KB
-
memory/628-91-0x0000000070BC0000-0x0000000071211000-memory.dmpFilesize
6.3MB
-
memory/628-82-0x0000000071340000-0x0000000071444000-memory.dmpFilesize
1.0MB
-
memory/628-83-0x0000000071220000-0x0000000071334000-memory.dmpFilesize
1.1MB
-
memory/628-84-0x0000000073E80000-0x000000007442B000-memory.dmpFilesize
5.7MB
-
memory/628-85-0x0000000072F10000-0x0000000073A08000-memory.dmpFilesize
11.0MB
-
memory/628-86-0x0000000072770000-0x0000000072F0C000-memory.dmpFilesize
7.6MB
-
memory/628-87-0x0000000074830000-0x00000000748B1000-memory.dmpFilesize
516KB
-
memory/628-88-0x00000000747E0000-0x000000007482B000-memory.dmpFilesize
300KB
-
memory/628-89-0x0000000071A60000-0x0000000071BFE000-memory.dmpFilesize
1.6MB
-
memory/628-90-0x0000000073DF0000-0x0000000073E75000-memory.dmpFilesize
532KB
-
memory/828-57-0x0000000000000000-mapping.dmp
-
memory/932-63-0x0000000000000000-mapping.dmp
-
memory/948-61-0x0000000000000000-mapping.dmp
-
memory/948-98-0x0000000000490000-0x00000000004D0000-memory.dmpFilesize
256KB
-
memory/948-100-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/948-111-0x0000000000490000-0x00000000004D0000-memory.dmpFilesize
256KB
-
memory/1688-56-0x0000000000000000-mapping.dmp
-
memory/1984-64-0x0000000000000000-mapping.dmp
-
memory/2016-54-0x0000000075191000-0x0000000075193000-memory.dmpFilesize
8KB
-
memory/2016-67-0x00000000005A0000-0x00000000005E0000-memory.dmpFilesize
256KB
-
memory/2016-55-0x00000000005A0000-0x00000000005E0000-memory.dmpFilesize
256KB