Analysis
-
max time kernel
65s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 07:45
Static task
static1
Behavioral task
behavioral1
Sample
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe
Resource
win10v2004-20220414-en
General
-
Target
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe
-
Size
428KB
-
MD5
54bc795028a9a3f1467d8ba8a3f1f5a2
-
SHA1
e5f7ba4baeb7bd0beef022c7535c071ab2c7d89d
-
SHA256
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa
-
SHA512
35b27257fc7a86aafbf5ee143e0b69562117de2491740a8a02282f2b698caeb8272b061da1310b8a1be1f0a7955c8616ff93cf78aadf61ceba46adc4487a5edf
Malware Config
Extracted
trickbot
1000219
ser0629
138.34.32.218:443
86.61.177.139:443
47.40.90.210:443
93.109.242.134:443
45.36.155.244:443
158.58.131.54:443
46.59.89.119:449
66.229.97.133:443
45.56.2.247:443
109.86.227.152:443
209.131.236.23:443
200.2.126.98:443
62.31.150.202:443
90.69.224.122:443
194.68.23.182:443
182.253.210.130:449
67.159.157.150:443
172.117.118.98:443
201.174.70.238:443
138.34.32.74:443
73.107.42.28:443
187.163.215.32:443
199.250.230.169:443
195.161.114.240:443
185.231.154.104:443
81.177.140.37:443
185.159.130.87:443
185.146.156.237:443
195.54.163.139:443
95.213.203.174:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 3 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/784-54-0x0000000010000000-0x0000000010040000-memory.dmp trickbot_loader32 behavioral1/memory/2016-69-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral1/memory/1520-90-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exepid process 936 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exepid process 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exedescription pid process target process PID 784 set thread context of 2016 784 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 936 set thread context of 1520 936 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 1244 sc.exe 1864 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exepowershell.exepid process 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 1956 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exepid process 784 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 936 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1956 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.execmd.execmd.execmd.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exedescription pid process target process PID 784 wrote to memory of 2016 784 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 784 wrote to memory of 2016 784 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 784 wrote to memory of 2016 784 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 784 wrote to memory of 2016 784 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 784 wrote to memory of 2016 784 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 2016 wrote to memory of 2044 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 2044 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 2044 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 2044 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 1980 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 1980 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 1980 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 1980 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 1892 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 1892 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 1892 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 1892 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe cmd.exe PID 2016 wrote to memory of 936 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 2016 wrote to memory of 936 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 2016 wrote to memory of 936 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 2016 wrote to memory of 936 2016 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 1980 wrote to memory of 1244 1980 cmd.exe sc.exe PID 1980 wrote to memory of 1244 1980 cmd.exe sc.exe PID 1980 wrote to memory of 1244 1980 cmd.exe sc.exe PID 1980 wrote to memory of 1244 1980 cmd.exe sc.exe PID 2044 wrote to memory of 1864 2044 cmd.exe sc.exe PID 2044 wrote to memory of 1864 2044 cmd.exe sc.exe PID 2044 wrote to memory of 1864 2044 cmd.exe sc.exe PID 2044 wrote to memory of 1864 2044 cmd.exe sc.exe PID 1892 wrote to memory of 1956 1892 cmd.exe powershell.exe PID 1892 wrote to memory of 1956 1892 cmd.exe powershell.exe PID 1892 wrote to memory of 1956 1892 cmd.exe powershell.exe PID 1892 wrote to memory of 1956 1892 cmd.exe powershell.exe PID 936 wrote to memory of 1520 936 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 936 wrote to memory of 1520 936 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 936 wrote to memory of 1520 936 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 936 wrote to memory of 1520 936 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 936 wrote to memory of 1520 936 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 1520 wrote to memory of 588 1520 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe"C:\Users\Admin\AppData\Local\Temp\3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe"C:\Users\Admin\AppData\Local\Temp\3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend4⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeC:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeC:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeFilesize
428KB
MD554bc795028a9a3f1467d8ba8a3f1f5a2
SHA1e5f7ba4baeb7bd0beef022c7535c071ab2c7d89d
SHA2563c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa
SHA51235b27257fc7a86aafbf5ee143e0b69562117de2491740a8a02282f2b698caeb8272b061da1310b8a1be1f0a7955c8616ff93cf78aadf61ceba46adc4487a5edf
-
C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeFilesize
428KB
MD554bc795028a9a3f1467d8ba8a3f1f5a2
SHA1e5f7ba4baeb7bd0beef022c7535c071ab2c7d89d
SHA2563c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa
SHA51235b27257fc7a86aafbf5ee143e0b69562117de2491740a8a02282f2b698caeb8272b061da1310b8a1be1f0a7955c8616ff93cf78aadf61ceba46adc4487a5edf
-
\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeFilesize
428KB
MD554bc795028a9a3f1467d8ba8a3f1f5a2
SHA1e5f7ba4baeb7bd0beef022c7535c071ab2c7d89d
SHA2563c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa
SHA51235b27257fc7a86aafbf5ee143e0b69562117de2491740a8a02282f2b698caeb8272b061da1310b8a1be1f0a7955c8616ff93cf78aadf61ceba46adc4487a5edf
-
memory/588-84-0x0000000140000000-0x0000000140036000-memory.dmpFilesize
216KB
-
memory/588-82-0x0000000000000000-mapping.dmp
-
memory/784-54-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/936-63-0x0000000000000000-mapping.dmp
-
memory/1244-65-0x0000000000000000-mapping.dmp
-
memory/1520-90-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1520-79-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/1520-75-0x0000000000401000-mapping.dmp
-
memory/1864-66-0x0000000000000000-mapping.dmp
-
memory/1892-61-0x0000000000000000-mapping.dmp
-
memory/1956-70-0x0000000074110000-0x00000000746BB000-memory.dmpFilesize
5.7MB
-
memory/1956-71-0x0000000074110000-0x00000000746BB000-memory.dmpFilesize
5.7MB
-
memory/1956-67-0x0000000000000000-mapping.dmp
-
memory/1980-60-0x0000000000000000-mapping.dmp
-
memory/2016-69-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2016-58-0x0000000076391000-0x0000000076393000-memory.dmpFilesize
8KB
-
memory/2016-57-0x0000000000401000-mapping.dmp
-
memory/2044-59-0x0000000000000000-mapping.dmp