Analysis
-
max time kernel
167s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 04:30
Static task
static1
Behavioral task
behavioral1
Sample
df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exe
Resource
win10v2004-20220414-en
General
-
Target
df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exe
-
Size
516KB
-
MD5
e18c9d414140f2cde7ae1151489f65b6
-
SHA1
79ed070d71ab2bf5ef7a669a328624e4e5c898b5
-
SHA256
df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3
-
SHA512
78fd08a6b2e3b9d9adb74a947225d3d49bc91bdc713a20dadf19f658eb985a39b8699d68844e46f5d72907edca95dbc05cf347ed7cf86f32720a280475c7a4e2
Malware Config
Extracted
trickbot
1000293
lib346
51.68.170.58:443
68.3.14.71:443
174.105.235.178:449
195.54.162.247:443
181.113.17.230:449
174.105.233.82:449
66.60.121.58:449
207.140.14.141:443
42.115.91.177:443
5.189.224.254:443
71.94.101.25:443
206.130.141.255:449
74.140.160.33:449
65.31.241.133:449
140.190.54.187:449
75.102.135.23:449
24.119.69.70:449
85.143.223.51:443
103.110.91.118:449
68.4.173.10:443
72.189.124.41:449
103.111.53.126:449
105.27.171.234:449
182.253.20.66:449
199.182.59.42:449
71.193.151.218:443
46.149.182.112:449
82.146.56.24:443
199.227.126.250:449
24.113.161.184:449
197.232.50.85:443
94.232.20.113:443
190.145.74.84:449
47.49.168.50:443
73.67.78.5:449
67.49.38.139:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDllName:pwgrab
Signatures
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/5040-132-0x0000000002FF0000-0x0000000003030000-memory.dmp trickbot_loader32 behavioral2/memory/5040-134-0x0000000002FF0000-0x0000000003030000-memory.dmp trickbot_loader32 behavioral2/memory/1232-142-0x0000000002120000-0x0000000002160000-memory.dmp trickbot_loader32 behavioral2/memory/5040-153-0x0000000002FF0000-0x0000000003030000-memory.dmp trickbot_loader32 behavioral2/memory/1232-156-0x0000000002120000-0x0000000002160000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exepid process 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\WSIGE\df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe = "C:\\Users\\Admin\\AppData\\Roaming\\WSIGE\\df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 icanhazip.com 34 myexternalip.com 43 myexternalip.com -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exedf9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exepid process 5040 df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exe 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exedf9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exedescription pid process target process PID 5040 wrote to memory of 1232 5040 df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exe df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe PID 5040 wrote to memory of 1232 5040 df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exe df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe PID 5040 wrote to memory of 1232 5040 df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exe df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe PID 1232 wrote to memory of 4788 1232 df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exe"C:\Users\Admin\AppData\Local\Temp\df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WSIGE\df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exeC:\Users\Admin\AppData\Roaming\WSIGE\df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WSIGE\df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exeFilesize
516KB
MD5e18c9d414140f2cde7ae1151489f65b6
SHA179ed070d71ab2bf5ef7a669a328624e4e5c898b5
SHA256df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3
SHA51278fd08a6b2e3b9d9adb74a947225d3d49bc91bdc713a20dadf19f658eb985a39b8699d68844e46f5d72907edca95dbc05cf347ed7cf86f32720a280475c7a4e2
-
C:\Users\Admin\AppData\Roaming\WSIGE\df9de76b3cce6e70de0674776a4c28293b80227e3341c466c10f0df8812413b3.exeFilesize
516KB
MD5e18c9d414140f2cde7ae1151489f65b6
SHA179ed070d71ab2bf5ef7a669a328624e4e5c898b5
SHA256df8de65b3cce5e60de0564665a4c27283b70226e3341c455c10f0df7712413b3
SHA51278fd08a6b2e3b9d9adb74a947225d3d49bc91bdc713a20dadf19f658eb985a39b8699d68844e46f5d72907edca95dbc05cf347ed7cf86f32720a280475c7a4e2
-
memory/1232-135-0x0000000000000000-mapping.dmp
-
memory/1232-142-0x0000000002120000-0x0000000002160000-memory.dmpFilesize
256KB
-
memory/1232-144-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/1232-156-0x0000000002120000-0x0000000002160000-memory.dmpFilesize
256KB
-
memory/4788-147-0x0000000000000000-mapping.dmp
-
memory/4788-149-0x0000000140000000-0x0000000140039000-memory.dmpFilesize
228KB
-
memory/5040-132-0x0000000002FF0000-0x0000000003030000-memory.dmpFilesize
256KB
-
memory/5040-134-0x0000000002FF0000-0x0000000003030000-memory.dmpFilesize
256KB
-
memory/5040-153-0x0000000002FF0000-0x0000000003030000-memory.dmpFilesize
256KB