Analysis
-
max time kernel
160s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 07:45
Static task
static1
Behavioral task
behavioral1
Sample
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe
Resource
win10v2004-20220414-en
General
-
Target
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe
-
Size
428KB
-
MD5
54bc795028a9a3f1467d8ba8a3f1f5a2
-
SHA1
e5f7ba4baeb7bd0beef022c7535c071ab2c7d89d
-
SHA256
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa
-
SHA512
35b27257fc7a86aafbf5ee143e0b69562117de2491740a8a02282f2b698caeb8272b061da1310b8a1be1f0a7955c8616ff93cf78aadf61ceba46adc4487a5edf
Malware Config
Extracted
trickbot
1000219
ser0629
138.34.32.218:443
86.61.177.139:443
47.40.90.210:443
93.109.242.134:443
45.36.155.244:443
158.58.131.54:443
46.59.89.119:449
66.229.97.133:443
45.56.2.247:443
109.86.227.152:443
209.131.236.23:443
200.2.126.98:443
62.31.150.202:443
90.69.224.122:443
194.68.23.182:443
182.253.210.130:449
67.159.157.150:443
172.117.118.98:443
201.174.70.238:443
138.34.32.74:443
73.107.42.28:443
187.163.215.32:443
199.250.230.169:443
195.161.114.240:443
185.231.154.104:443
81.177.140.37:443
185.159.130.87:443
185.146.156.237:443
195.54.163.139:443
95.213.203.174:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 3 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2684-130-0x0000000010000000-0x0000000010040000-memory.dmp trickbot_loader32 behavioral2/memory/1324-137-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral2/memory/4324-155-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exepid process 4124 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe = "C:\\Users\\Admin\\AppData\\Roaming\\sysmon\\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe" svchost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 38 myexternalip.com 51 myexternalip.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exedescription pid process target process PID 2684 set thread context of 1324 2684 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 4124 set thread context of 4324 4124 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exepid process 2684 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 4124 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exedescription pid process target process PID 2684 wrote to memory of 1324 2684 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 2684 wrote to memory of 1324 2684 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 2684 wrote to memory of 1324 2684 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 2684 wrote to memory of 1324 2684 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe PID 1324 wrote to memory of 4124 1324 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 1324 wrote to memory of 4124 1324 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 1324 wrote to memory of 4124 1324 3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 4124 wrote to memory of 4324 4124 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 4124 wrote to memory of 4324 4124 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 4124 wrote to memory of 4324 4124 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 4124 wrote to memory of 4324 4124 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe PID 4324 wrote to memory of 4076 4324 3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe"C:\Users\Admin\AppData\Local\Temp\3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe"C:\Users\Admin\AppData\Local\Temp\3c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeC:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeC:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeFilesize
428KB
MD554bc795028a9a3f1467d8ba8a3f1f5a2
SHA1e5f7ba4baeb7bd0beef022c7535c071ab2c7d89d
SHA2563c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa
SHA51235b27257fc7a86aafbf5ee143e0b69562117de2491740a8a02282f2b698caeb8272b061da1310b8a1be1f0a7955c8616ff93cf78aadf61ceba46adc4487a5edf
-
C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeFilesize
428KB
MD554bc795028a9a3f1467d8ba8a3f1f5a2
SHA1e5f7ba4baeb7bd0beef022c7535c071ab2c7d89d
SHA2563c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa
SHA51235b27257fc7a86aafbf5ee143e0b69562117de2491740a8a02282f2b698caeb8272b061da1310b8a1be1f0a7955c8616ff93cf78aadf61ceba46adc4487a5edf
-
C:\Users\Admin\AppData\Roaming\sysmon\3c6b09874e91c101cb4e169ce6bd978206641b99e08ff66978a617cb1d8962fa.exeFilesize
428KB
MD554bc795028a9a3f1467d8ba8a3f1f5a2
SHA1e5f7ba4baeb7bd0beef022c7535c071ab2c7d89d
SHA2563c5b08764e81c101cb4e158ce5bd867205541b99e07ff55967a516cb1d7852fa
SHA51235b27257fc7a86aafbf5ee143e0b69562117de2491740a8a02282f2b698caeb8272b061da1310b8a1be1f0a7955c8616ff93cf78aadf61ceba46adc4487a5edf
-
memory/1324-133-0x0000000000000000-mapping.dmp
-
memory/1324-137-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2684-130-0x0000000010000000-0x0000000010040000-memory.dmpFilesize
256KB
-
memory/4076-147-0x0000000000000000-mapping.dmp
-
memory/4076-149-0x0000000140000000-0x0000000140036000-memory.dmpFilesize
216KB
-
memory/4124-134-0x0000000000000000-mapping.dmp
-
memory/4324-141-0x0000000000000000-mapping.dmp
-
memory/4324-144-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/4324-155-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB