Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 05:34
Static task
static1
Behavioral task
behavioral1
Sample
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe
Resource
win7-20220715-en
General
-
Target
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe
-
Size
350KB
-
MD5
02441573d362188574bb84b67032b83f
-
SHA1
1a00c86f95c432810a173bbb4cb5e241282b0609
-
SHA256
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
-
SHA512
8e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4040-133-0x0000000000700000-0x0000000000730000-memory.dmp trickbot_loader32 behavioral2/memory/4040-135-0x00000000006D0000-0x00000000006FE000-memory.dmp trickbot_loader32 behavioral2/memory/4040-136-0x0000000000701000-0x000000000072F000-memory.dmp trickbot_loader32 behavioral2/memory/4040-138-0x0000000000701000-0x000000000072F000-memory.dmp trickbot_loader32 behavioral2/memory/2072-145-0x00000000014D1000-0x00000000014FF000-memory.dmp trickbot_loader32 behavioral2/memory/2072-147-0x00000000014D1000-0x00000000014FF000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
Ñчв.exeÑчв.exepid process 4040 Ñчв.exe 2072 Ñчв.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 1592 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exeÑчв.exeÑчв.exedescription pid process target process PID 4424 wrote to memory of 4040 4424 e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe Ñчв.exe PID 4424 wrote to memory of 4040 4424 e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe Ñчв.exe PID 4424 wrote to memory of 4040 4424 e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe Ñчв.exe PID 4040 wrote to memory of 4188 4040 Ñчв.exe svchost.exe PID 4040 wrote to memory of 4188 4040 Ñчв.exe svchost.exe PID 4040 wrote to memory of 4188 4040 Ñчв.exe svchost.exe PID 4040 wrote to memory of 4188 4040 Ñчв.exe svchost.exe PID 2072 wrote to memory of 1592 2072 Ñчв.exe svchost.exe PID 2072 wrote to memory of 1592 2072 Ñчв.exe svchost.exe PID 2072 wrote to memory of 1592 2072 Ñчв.exe svchost.exe PID 2072 wrote to memory of 1592 2072 Ñчв.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe"C:\Users\Admin\AppData\Local\Temp\e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Ñчв.exe"C:\ProgramData\Ñчв.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\cmdcache\Ñчв.exeC:\Users\Admin\AppData\Roaming\cmdcache\Ñчв.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
C:\ProgramData\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
C:\Users\Admin\AppData\Roaming\cmdcache\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
C:\Users\Admin\AppData\Roaming\cmdcache\Ñчв.exeFilesize
350KB
MD502441573d362188574bb84b67032b83f
SHA11a00c86f95c432810a173bbb4cb5e241282b0609
SHA256e053947a18a68631a4ef994942164414a319641bfb01185d6f55b317cbb128ee
SHA5128e2a397f89fde598a2b9afd7f0432dbd241179471e76240f6d37399f0e5bc7b812c0379b685493ec8c7cd669cc803af69136ce53da4e9374d9257abd2a613556
-
memory/1592-148-0x0000022392C60000-0x0000022392C80000-memory.dmpFilesize
128KB
-
memory/1592-146-0x0000000000000000-mapping.dmp
-
memory/2072-147-0x00000000014D1000-0x00000000014FF000-memory.dmpFilesize
184KB
-
memory/2072-145-0x00000000014D1000-0x00000000014FF000-memory.dmpFilesize
184KB
-
memory/4040-135-0x00000000006D0000-0x00000000006FE000-memory.dmpFilesize
184KB
-
memory/4040-138-0x0000000000701000-0x000000000072F000-memory.dmpFilesize
184KB
-
memory/4040-136-0x0000000000701000-0x000000000072F000-memory.dmpFilesize
184KB
-
memory/4040-130-0x0000000000000000-mapping.dmp
-
memory/4040-133-0x0000000000700000-0x0000000000730000-memory.dmpFilesize
192KB
-
memory/4188-140-0x000001933B560000-0x000001933B580000-memory.dmpFilesize
128KB
-
memory/4188-139-0x000001933B560000-0x000001933B580000-memory.dmpFilesize
128KB
-
memory/4188-137-0x0000000000000000-mapping.dmp