Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 04:39
Static task
static1
Behavioral task
behavioral1
Sample
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe
Resource
win7-20220414-en
General
-
Target
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe
-
Size
432KB
-
MD5
77a940af07da194ff27c1d33fd7dce73
-
SHA1
af15833d70ab5dccb3014616b3e24259b802f2c4
-
SHA256
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
-
SHA512
f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
Malware Config
Extracted
trickbot
1000491
tot632
23.94.70.12:443
5.182.210.132:443
5.2.75.137:443
172.82.152.136:443
198.23.252.117:443
194.5.250.62:443
185.14.30.176:443
195.123.245.127:443
195.54.162.179:443
184.164.137.190:443
198.46.161.213:443
64.44.51.106:443
107.172.251.159:443
85.143.220.41:443
107.172.29.108:443
107.172.208.51:443
107.181.187.221:443
190.214.13.2:449
181.140.173.186:449
181.129.104.139:449
181.113.28.146:449
181.112.157.42:449
170.84.78.224:449
200.21.51.38:449
46.174.235.36:449
36.89.85.103:449
181.129.134.18:449
186.71.150.23:449
131.161.253.190:449
200.127.121.99:449
114.8.133.71:449
119.252.165.75:449
121.100.19.18:449
202.29.215.114:449
180.180.216.177:449
171.100.142.238:449
186.232.91.240:449
181.196.207.202:449
-
autorunName:pwgrab
Signatures
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4532-132-0x0000000002120000-0x000000000214E000-memory.dmp trickbot_loader32 behavioral2/memory/4532-134-0x0000000002120000-0x000000000214E000-memory.dmp trickbot_loader32 behavioral2/memory/2392-144-0x0000000002750000-0x000000000277E000-memory.dmp trickbot_loader32 behavioral2/memory/4532-145-0x0000000002120000-0x000000000214E000-memory.dmp trickbot_loader32 behavioral2/memory/4600-153-0x0000000000D80000-0x0000000000DAE000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exepid process 2392 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe 4600 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exedescription pid process Token: SeTcbPrivilege 4600 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exepid process 4532 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 2392 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe 4600 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exedescription pid process target process PID 4532 wrote to memory of 2392 4532 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 4532 wrote to memory of 2392 4532 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 4532 wrote to memory of 2392 4532 5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe PID 2392 wrote to memory of 1380 2392 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 2392 wrote to memory of 1380 2392 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 2392 wrote to memory of 1380 2392 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 2392 wrote to memory of 1380 2392 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 4600 wrote to memory of 4216 4600 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 4600 wrote to memory of 4216 4600 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 4600 wrote to memory of 4216 4600 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe PID 4600 wrote to memory of 4216 4600 7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe"C:\Users\Admin\AppData\Local\Temp\5534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeC:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeC:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeFilesize
432KB
MD577a940af07da194ff27c1d33fd7dce73
SHA1af15833d70ab5dccb3014616b3e24259b802f2c4
SHA2565534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
SHA512f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeFilesize
432KB
MD577a940af07da194ff27c1d33fd7dce73
SHA1af15833d70ab5dccb3014616b3e24259b802f2c4
SHA2565534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
SHA512f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
-
C:\Users\Admin\AppData\Roaming\sysdefragler\7734b9acb499f398230d38289a4218c8712a3fe2f843b0c7fd04d84c07d79f7d.exeFilesize
432KB
MD577a940af07da194ff27c1d33fd7dce73
SHA1af15833d70ab5dccb3014616b3e24259b802f2c4
SHA2565534b7acb497f398230d38287a4216c8512a3fe2f643b0c5fd04d64c05d57f5d
SHA512f5d92f1c8d23f4bfc32004e8dbd7d88f732a455bdf94e10e6a5a456e7e4762006d3b17550822496b8a3f6f06c4de68152b4f650c1546159b55a90a59649f8dd0
-
memory/1380-143-0x00000261DECB0000-0x00000261DECD0000-memory.dmpFilesize
128KB
-
memory/1380-142-0x0000000000000000-mapping.dmp
-
memory/2392-135-0x0000000000000000-mapping.dmp
-
memory/2392-144-0x0000000002750000-0x000000000277E000-memory.dmpFilesize
184KB
-
memory/2392-146-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB
-
memory/4216-152-0x0000000000000000-mapping.dmp
-
memory/4216-155-0x00000273F0B00000-0x00000273F0B20000-memory.dmpFilesize
128KB
-
memory/4532-132-0x0000000002120000-0x000000000214E000-memory.dmpFilesize
184KB
-
memory/4532-145-0x0000000002120000-0x000000000214E000-memory.dmpFilesize
184KB
-
memory/4532-134-0x0000000002120000-0x000000000214E000-memory.dmpFilesize
184KB
-
memory/4600-153-0x0000000000D80000-0x0000000000DAE000-memory.dmpFilesize
184KB
-
memory/4600-154-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB