Analysis
-
max time kernel
167s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 04:56
Static task
static1
Behavioral task
behavioral1
Sample
7d038093ccb23e2344f2600956d02c92257ddee37dce2cdb214412739a96b552.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
7d038093ccb23e2344f2600956d02c92257ddee37dce2cdb214412739a96b552.exe
-
Size
162KB
-
MD5
cb469a6e407467018e844341d9e33319
-
SHA1
2b967f03b44866b3f48a55f494ca4bf267cd5adf
-
SHA256
7d038093ccb23e2344f2600956d02c92257ddee37dce2cdb214412739a96b552
-
SHA512
08cac052aaa95706e6a7001ed428fb6f646e0a1e245bf1aab7c02726386f905a38b89ad013243a07111ddef59e45795da375e4cb1f8ef76a0018e6a84005ccc5
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1892-130-0x0000000002090000-0x0000000002099000-memory.dmp trickbot_loader32
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1892-130-0x0000000002090000-0x0000000002099000-memory.dmpFilesize
36KB