Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 21:55
Static task
static1
Behavioral task
behavioral1
Sample
5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe
Resource
win10v2004-20220722-en
General
-
Target
5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe
-
Size
383KB
-
MD5
366c27888902481f1e12ebbfa9ce946a
-
SHA1
7801599ce1123bfe5990534d0c649ec913aae5cd
-
SHA256
5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3
-
SHA512
6d253a38151308e9cbf5537cd440f094d159a3e90c5a4826ff94f4e16b2b66b39563da3807b59db83dfd74c0255d51e3d0e3afed1a631697c92dd7b3f10f51f5
Malware Config
Extracted
trickbot
1000287
ser1025us
193.111.63.208:443
68.3.14.71:443
174.105.235.178:449
5.196.131.249:443
181.113.17.230:449
205.157.150.98:443
185.251.38.187:443
207.140.14.141:443
42.115.91.177:443
54.39.167.242:443
71.94.101.25:443
68.45.243.125:449
82.202.236.66:443
74.140.160.33:449
76.181.182.166:449
140.190.54.187:449
82.222.40.119:449
24.119.69.70:449
188.68.208.242:443
103.110.91.118:449
68.4.173.10:443
207.191.33.112:449
103.111.53.126:449
105.27.171.234:449
182.253.20.66:449
71.13.140.89:443
71.193.151.218:443
46.149.182.112:449
37.235.251.150:449
62.141.94.107:443
115.78.3.170:443
197.232.50.85:443
94.232.20.113:443
190.145.74.84:449
47.49.168.50:443
73.67.78.5:449
67.49.38.139:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDllName:pwgrab
Signatures
-
Trickbot x86 loader 2 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/2020-79-0x0000000000260000-0x00000000002A0000-memory.dmp trickbot_loader32 behavioral1/memory/1584-80-0x0000000000170000-0x00000000001B0000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exepid process 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exepid process 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 1404 sc.exe 1528 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exepowershell.exepid process 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe 1740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1740 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.execmd.execmd.execmd.exe6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exedescription pid process target process PID 2020 wrote to memory of 1028 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 1028 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 1028 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 1028 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 1312 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 1312 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 1312 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 1312 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 984 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 984 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 984 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 984 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe cmd.exe PID 2020 wrote to memory of 1584 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe PID 2020 wrote to memory of 1584 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe PID 2020 wrote to memory of 1584 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe PID 2020 wrote to memory of 1584 2020 5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe PID 1312 wrote to memory of 1404 1312 cmd.exe sc.exe PID 1312 wrote to memory of 1404 1312 cmd.exe sc.exe PID 1312 wrote to memory of 1404 1312 cmd.exe sc.exe PID 1312 wrote to memory of 1404 1312 cmd.exe sc.exe PID 984 wrote to memory of 1740 984 cmd.exe powershell.exe PID 984 wrote to memory of 1740 984 cmd.exe powershell.exe PID 984 wrote to memory of 1740 984 cmd.exe powershell.exe PID 984 wrote to memory of 1740 984 cmd.exe powershell.exe PID 1028 wrote to memory of 1528 1028 cmd.exe sc.exe PID 1028 wrote to memory of 1528 1028 cmd.exe sc.exe PID 1028 wrote to memory of 1528 1028 cmd.exe sc.exe PID 1028 wrote to memory of 1528 1028 cmd.exe sc.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe PID 1584 wrote to memory of 1288 1584 6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe"C:\Users\Admin\AppData\Local\Temp\5df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\WSOG\6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exeC:\Users\Admin\AppData\Roaming\WSOG\6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3762437355-3468409815-1164039494-1000\0f5007522459c86e95ffcc62f32308f1_327f7753-eed3-43ec-871a-c7bcf65868ecFilesize
1KB
MD59867c229bd7125d11d62a43a4e242df2
SHA1f32eebbdefec4ff5c6cd856e8217557df3b41790
SHA256cab862a40aa80512c215612821e1f972fa1f337dd8977d4ca2e3c88172d6fb4b
SHA5127b18d6c04371007420709e35d3a1d9624b05a2034d826c3cfce8e0b55517ffd175bff91be5fab2632a369218740c1393cc5211253e523e9750ea2c182fbdaaee
-
C:\Users\Admin\AppData\Roaming\WSOG\6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exeFilesize
383KB
MD5366c27888902481f1e12ebbfa9ce946a
SHA17801599ce1123bfe5990534d0c649ec913aae5cd
SHA2565df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3
SHA5126d253a38151308e9cbf5537cd440f094d159a3e90c5a4826ff94f4e16b2b66b39563da3807b59db83dfd74c0255d51e3d0e3afed1a631697c92dd7b3f10f51f5
-
\Users\Admin\AppData\Roaming\WSOG\6df27114f87ec97dcd6309e3b60389fd68f0e0f97b22d3246d18c7e18fdd97d3.exeFilesize
383KB
MD5366c27888902481f1e12ebbfa9ce946a
SHA17801599ce1123bfe5990534d0c649ec913aae5cd
SHA2565df26114f76ec86dcd5309e3b50379fd57f0e0f86b22d3245d17c6e17fdd96d3
SHA5126d253a38151308e9cbf5537cd440f094d159a3e90c5a4826ff94f4e16b2b66b39563da3807b59db83dfd74c0255d51e3d0e3afed1a631697c92dd7b3f10f51f5
-
memory/984-57-0x0000000000000000-mapping.dmp
-
memory/1028-55-0x0000000000000000-mapping.dmp
-
memory/1288-70-0x0000000000000000-mapping.dmp
-
memory/1288-73-0x0000000140000000-0x0000000140039000-memory.dmpFilesize
228KB
-
memory/1312-56-0x0000000000000000-mapping.dmp
-
memory/1404-62-0x0000000000000000-mapping.dmp
-
memory/1528-64-0x0000000000000000-mapping.dmp
-
memory/1584-59-0x0000000000000000-mapping.dmp
-
memory/1584-67-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/1584-80-0x0000000000170000-0x00000000001B0000-memory.dmpFilesize
256KB
-
memory/1740-63-0x0000000000000000-mapping.dmp
-
memory/1740-81-0x0000000073840000-0x0000000073DEB000-memory.dmpFilesize
5.7MB
-
memory/1740-82-0x0000000073840000-0x0000000073DEB000-memory.dmpFilesize
5.7MB
-
memory/2020-54-0x0000000075BF1000-0x0000000075BF3000-memory.dmpFilesize
8KB
-
memory/2020-79-0x0000000000260000-0x00000000002A0000-memory.dmpFilesize
256KB