Analysis
-
max time kernel
111s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 04:39
Static task
static1
Behavioral task
behavioral1
Sample
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe
Resource
win7-20220414-en
General
-
Target
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe
-
Size
432KB
-
MD5
77a940af07da194ff27c1d33fd7dce73
-
SHA1
af15833d70ab5dccb3014616b3e24259b802f2c4
-
SHA256
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
-
SHA512
f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
Malware Config
Extracted
trickbot
1000491
tot632
23.94.70.12:443
5.182.210.132:443
5.2.75.137:443
172.82.152.136:443
198.23.252.117:443
194.5.250.62:443
185.14.30.176:443
195.123.245.127:443
195.54.162.179:443
184.164.137.190:443
198.46.161.213:443
64.44.51.106:443
107.172.251.159:443
85.143.220.41:443
107.172.29.108:443
107.172.208.51:443
107.181.187.221:443
190.214.13.2:449
181.140.173.186:449
181.129.104.139:449
181.113.28.146:449
181.112.157.42:449
170.84.78.224:449
200.21.51.38:449
46.174.235.36:449
36.89.85.103:449
181.129.134.18:449
186.71.150.23:449
131.161.253.190:449
200.127.121.99:449
114.8.133.71:449
119.252.165.75:449
121.100.19.18:449
202.29.215.114:449
180.180.216.177:449
171.100.142.238:449
186.232.91.240:449
181.196.207.202:449
-
autorunName:pwgrab
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/1728-56-0x00000000002E0000-0x000000000030E000-memory.dmp trickbot_loader32 behavioral1/memory/1728-65-0x00000000002E0000-0x000000000030E000-memory.dmp trickbot_loader32 behavioral1/memory/1660-70-0x0000000000260000-0x000000000028E000-memory.dmp trickbot_loader32 behavioral1/memory/1892-83-0x0000000000280000-0x00000000002AE000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exepid process 1660 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe 1892 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe -
Loads dropped DLL 2 IoCs
Processes:
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exepid process 1728 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 1728 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exedescription pid process Token: SeTcbPrivilege 1892 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exepid process 1728 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 1660 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe 1892 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exetaskeng.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exedescription pid process target process PID 1728 wrote to memory of 1660 1728 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 1728 wrote to memory of 1660 1728 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 1728 wrote to memory of 1660 1728 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 1728 wrote to memory of 1660 1728 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 1660 wrote to memory of 960 1660 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1660 wrote to memory of 960 1660 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1660 wrote to memory of 960 1660 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1660 wrote to memory of 960 1660 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1660 wrote to memory of 960 1660 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1660 wrote to memory of 960 1660 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1016 wrote to memory of 1892 1016 taskeng.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 1016 wrote to memory of 1892 1016 taskeng.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 1016 wrote to memory of 1892 1016 taskeng.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 1016 wrote to memory of 1892 1016 taskeng.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 1892 wrote to memory of 1164 1892 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1892 wrote to memory of 1164 1892 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1892 wrote to memory of 1164 1892 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1892 wrote to memory of 1164 1892 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1892 wrote to memory of 1164 1892 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 1892 wrote to memory of 1164 1892 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe"C:\Users\Admin\AppData\Local\Temp\5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeC:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {2E9661C2-2A0D-4CE8-B938-8B39385B9133} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeC:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeFilesize
432KB
MD577a940af07da194ff27c1d33fd7dce73
SHA1af15833d70ab5dccb3014616b3e24259b802f2c4
SHA2565534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
SHA512f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeFilesize
432KB
MD577a940af07da194ff27c1d33fd7dce73
SHA1af15833d70ab5dccb3014616b3e24259b802f2c4
SHA2565534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
SHA512f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeFilesize
432KB
MD577a940af07da194ff27c1d33fd7dce73
SHA1af15833d70ab5dccb3014616b3e24259b802f2c4
SHA2565534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
SHA512f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
-
\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeFilesize
432KB
MD577a940af07da194ff27c1d33fd7dce73
SHA1af15833d70ab5dccb3014616b3e24259b802f2c4
SHA2565534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
SHA512f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
-
\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeFilesize
432KB
MD577a940af07da194ff27c1d33fd7dce73
SHA1af15833d70ab5dccb3014616b3e24259b802f2c4
SHA2565534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
SHA512f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
-
memory/960-73-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/960-69-0x0000000000000000-mapping.dmp
-
memory/960-72-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/1164-86-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/1164-85-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/1164-82-0x0000000000000000-mapping.dmp
-
memory/1660-61-0x0000000000000000-mapping.dmp
-
memory/1660-70-0x0000000000260000-0x000000000028E000-memory.dmpFilesize
184KB
-
memory/1660-71-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB
-
memory/1728-65-0x00000000002E0000-0x000000000030E000-memory.dmpFilesize
184KB
-
memory/1728-56-0x00000000002E0000-0x000000000030E000-memory.dmpFilesize
184KB
-
memory/1728-58-0x0000000076171000-0x0000000076173000-memory.dmpFilesize
8KB
-
memory/1892-75-0x0000000000000000-mapping.dmp
-
memory/1892-83-0x0000000000280000-0x00000000002AE000-memory.dmpFilesize
184KB
-
memory/1892-84-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB