Analysis
-
max time kernel
173s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 05:35
Static task
static1
Behavioral task
behavioral1
Sample
d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exe
Resource
win7-20220715-en
General
-
Target
d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exe
-
Size
492KB
-
MD5
3f1b28c0955bf9d8854a7a0887ba8785
-
SHA1
29d602d28f21760a38e46f7d2f9a1f08d3dea092
-
SHA256
d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b
-
SHA512
c46941e6578d06a7a5760847022b04414ca3d07af629957e12ebbd892b3f60bc1b86fb93c038ba3172f1c233edd99f18586e477a5f983cfd55ee6000cd0771ec
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3448-133-0x00000000020D0000-0x00000000020FD000-memory.dmp trickbot_loader32 behavioral2/memory/3448-135-0x00000000020D0000-0x00000000020FD000-memory.dmp trickbot_loader32 behavioral2/memory/3844-139-0x0000000000E20000-0x0000000000E4D000-memory.dmp trickbot_loader32 behavioral2/memory/3844-141-0x0000000000E20000-0x0000000000E4D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
ըհվտռոոոռեռֆ.exeըհվտռոոոռեռֆ.exepid process 3448 ըհվտռոոոռեռֆ.exe 3844 ըհվտռոոոռեռֆ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 4624 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exeըհվտռոոոռեռֆ.exeըհվտռոոոռեռֆ.exepid process 4172 d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exe 3448 ըհվտռոոոռեռֆ.exe 3844 ըհվտռոոոռեռֆ.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exeըհվտռոոոռեռֆ.exeըհվտռոոոռեռֆ.exedescription pid process target process PID 4172 wrote to memory of 3448 4172 d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exe ըհվտռոոոռեռֆ.exe PID 4172 wrote to memory of 3448 4172 d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exe ըհվտռոոոռեռֆ.exe PID 4172 wrote to memory of 3448 4172 d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exe ըհվտռոոոռեռֆ.exe PID 3448 wrote to memory of 3412 3448 ըհվտռոոոռեռֆ.exe svchost.exe PID 3448 wrote to memory of 3412 3448 ըհվտռոոոռեռֆ.exe svchost.exe PID 3448 wrote to memory of 3412 3448 ըհվտռոոոռեռֆ.exe svchost.exe PID 3448 wrote to memory of 3412 3448 ըհվտռոոոռեռֆ.exe svchost.exe PID 3844 wrote to memory of 4624 3844 ըհվտռոոոռեռֆ.exe svchost.exe PID 3844 wrote to memory of 4624 3844 ըհվտռոոոռեռֆ.exe svchost.exe PID 3844 wrote to memory of 4624 3844 ըհվտռոոոռեռֆ.exe svchost.exe PID 3844 wrote to memory of 4624 3844 ըհվտռոոոռեռֆ.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exe"C:\Users\Admin\AppData\Local\Temp\d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\ըհվտռոոոռեռֆ.exe"C:\ProgramData\ըհվտռոոոռեռֆ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\netcloud\ըհվտռոոոռեռֆ.exeC:\Users\Admin\AppData\Roaming\netcloud\ըհվտռոոոռեռֆ.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ըհվտռոոոռեռֆ.exeFilesize
492KB
MD53f1b28c0955bf9d8854a7a0887ba8785
SHA129d602d28f21760a38e46f7d2f9a1f08d3dea092
SHA256d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b
SHA512c46941e6578d06a7a5760847022b04414ca3d07af629957e12ebbd892b3f60bc1b86fb93c038ba3172f1c233edd99f18586e477a5f983cfd55ee6000cd0771ec
-
C:\ProgramData\ըհվտռոոոռեռֆ.exeFilesize
492KB
MD53f1b28c0955bf9d8854a7a0887ba8785
SHA129d602d28f21760a38e46f7d2f9a1f08d3dea092
SHA256d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b
SHA512c46941e6578d06a7a5760847022b04414ca3d07af629957e12ebbd892b3f60bc1b86fb93c038ba3172f1c233edd99f18586e477a5f983cfd55ee6000cd0771ec
-
C:\Users\Admin\AppData\Roaming\netcloud\ըհվտռոոոռեռֆ.exeFilesize
492KB
MD53f1b28c0955bf9d8854a7a0887ba8785
SHA129d602d28f21760a38e46f7d2f9a1f08d3dea092
SHA256d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b
SHA512c46941e6578d06a7a5760847022b04414ca3d07af629957e12ebbd892b3f60bc1b86fb93c038ba3172f1c233edd99f18586e477a5f983cfd55ee6000cd0771ec
-
C:\Users\Admin\AppData\Roaming\netcloud\ըհվտռոոոռեռֆ.exeFilesize
492KB
MD53f1b28c0955bf9d8854a7a0887ba8785
SHA129d602d28f21760a38e46f7d2f9a1f08d3dea092
SHA256d0cc346706bfebc9882fa24199177320c076d02bf844a400a50600437836377b
SHA512c46941e6578d06a7a5760847022b04414ca3d07af629957e12ebbd892b3f60bc1b86fb93c038ba3172f1c233edd99f18586e477a5f983cfd55ee6000cd0771ec
-
memory/3412-136-0x000001E2E6590000-0x000001E2E65AE000-memory.dmpFilesize
120KB
-
memory/3412-134-0x0000000000000000-mapping.dmp
-
memory/3448-133-0x00000000020D0000-0x00000000020FD000-memory.dmpFilesize
180KB
-
memory/3448-135-0x00000000020D0000-0x00000000020FD000-memory.dmpFilesize
180KB
-
memory/3448-130-0x0000000000000000-mapping.dmp
-
memory/3844-139-0x0000000000E20000-0x0000000000E4D000-memory.dmpFilesize
180KB
-
memory/3844-141-0x0000000000E20000-0x0000000000E4D000-memory.dmpFilesize
180KB
-
memory/4624-140-0x0000000000000000-mapping.dmp
-
memory/4624-142-0x00000212F5280000-0x00000212F529E000-memory.dmpFilesize
120KB
-
memory/4624-143-0x00000212F5280000-0x00000212F529E000-memory.dmpFilesize
120KB