Analysis
-
max time kernel
114s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 05:34
Static task
static1
Behavioral task
behavioral1
Sample
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe
Resource
win7-20220715-en
General
-
Target
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe
-
Size
350KB
-
MD5
02441573d362188574bb84b67032b83f
-
SHA1
1a00c86f95c432810a173bbb4cb5e241282b0609
-
SHA256
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
-
SHA512
8e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/2012-61-0x00000000003D0000-0x0000000000400000-memory.dmp trickbot_loader32 behavioral1/memory/2012-63-0x00000000003A0000-0x00000000003CE000-memory.dmp trickbot_loader32 behavioral1/memory/2012-64-0x00000000003D1000-0x00000000003FF000-memory.dmp trickbot_loader32 behavioral1/memory/2012-66-0x00000000003D1000-0x00000000003FF000-memory.dmp trickbot_loader32 behavioral1/memory/1796-75-0x00000000003B1000-0x00000000003DF000-memory.dmp trickbot_loader32 behavioral1/memory/1796-77-0x00000000003B1000-0x00000000003DF000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
Ñчв.exeÑчв.exepid process 2012 Ñчв.exe 1796 Ñчв.exe -
Loads dropped DLL 2 IoCs
Processes:
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exepid process 1772 e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe 1772 e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 592 svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exeÑчв.exetaskeng.exeÑчв.exedescription pid process target process PID 1772 wrote to memory of 2012 1772 e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe Ñчв.exe PID 1772 wrote to memory of 2012 1772 e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe Ñчв.exe PID 1772 wrote to memory of 2012 1772 e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe Ñчв.exe PID 1772 wrote to memory of 2012 1772 e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe Ñчв.exe PID 2012 wrote to memory of 1968 2012 Ñчв.exe svchost.exe PID 2012 wrote to memory of 1968 2012 Ñчв.exe svchost.exe PID 2012 wrote to memory of 1968 2012 Ñчв.exe svchost.exe PID 2012 wrote to memory of 1968 2012 Ñчв.exe svchost.exe PID 2012 wrote to memory of 1968 2012 Ñчв.exe svchost.exe PID 2012 wrote to memory of 1968 2012 Ñчв.exe svchost.exe PID 1804 wrote to memory of 1796 1804 taskeng.exe Ñчв.exe PID 1804 wrote to memory of 1796 1804 taskeng.exe Ñчв.exe PID 1804 wrote to memory of 1796 1804 taskeng.exe Ñчв.exe PID 1804 wrote to memory of 1796 1804 taskeng.exe Ñчв.exe PID 1796 wrote to memory of 592 1796 Ñчв.exe svchost.exe PID 1796 wrote to memory of 592 1796 Ñчв.exe svchost.exe PID 1796 wrote to memory of 592 1796 Ñчв.exe svchost.exe PID 1796 wrote to memory of 592 1796 Ñчв.exe svchost.exe PID 1796 wrote to memory of 592 1796 Ñчв.exe svchost.exe PID 1796 wrote to memory of 592 1796 Ñчв.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe"C:\Users\Admin\AppData\Local\Temp\e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Ñчв.exe"C:\ProgramData\Ñчв.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {BAC4FE6E-2984-45D1-A8D9-910436729373} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\cmdcache\Ñчв.exeC:\Users\Admin\AppData\Roaming\cmdcache\Ñчв.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
C:\ProgramData\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
C:\Users\Admin\AppData\Roaming\cmdcache\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
C:\Users\Admin\AppData\Roaming\cmdcache\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
\ProgramData\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
\ProgramData\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
memory/592-80-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/592-79-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/592-76-0x0000000000000000-mapping.dmp
-
memory/1772-54-0x0000000075511000-0x0000000075513000-memory.dmpFilesize
8KB
-
memory/1796-70-0x0000000000000000-mapping.dmp
-
memory/1796-75-0x00000000003B1000-0x00000000003DF000-memory.dmpFilesize
184KB
-
memory/1796-77-0x00000000003B1000-0x00000000003DF000-memory.dmpFilesize
184KB
-
memory/1796-78-0x0000000010001000-0x0000000010005000-memory.dmpFilesize
16KB
-
memory/1968-67-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/1968-68-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/1968-65-0x0000000000000000-mapping.dmp
-
memory/2012-66-0x00000000003D1000-0x00000000003FF000-memory.dmpFilesize
184KB
-
memory/2012-64-0x00000000003D1000-0x00000000003FF000-memory.dmpFilesize
184KB
-
memory/2012-63-0x00000000003A0000-0x00000000003CE000-memory.dmpFilesize
184KB
-
memory/2012-61-0x00000000003D0000-0x0000000000400000-memory.dmpFilesize
192KB
-
memory/2012-57-0x0000000000000000-mapping.dmp