Analysis
-
max time kernel
209s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 04:57
Static task
static1
Behavioral task
behavioral1
Sample
c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.exe
Resource
win7-20220718-en
windows7-x64
7 signatures
150 seconds
General
-
Target
c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.exe
-
Size
162KB
-
MD5
a0565dc0bb68fd8c0437d5e368d7de23
-
SHA1
68e17b0cb0a8f48d77f4923a42584ad867132f7a
-
SHA256
c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6
-
SHA512
630781b22a9c231155ed82a94f6ff06fba9582a3bc036e821f875149f468680bdee5e8cf3f09a4b5c184d439ea1abfed5b420d7cef06b2550f2fcdb4f9017024
Malware Config
Signatures
-
Trickbot x86 loader 3 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1960-131-0x0000000002060000-0x0000000002069000-memory.dmp trickbot_loader32 behavioral2/memory/1960-132-0x0000000002060000-0x0000000002069000-memory.dmp trickbot_loader32 behavioral2/memory/1960-134-0x0000000002060000-0x0000000002069000-memory.dmp trickbot_loader32 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2128 powershell.exe 2128 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2128 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.execmd.exedescription pid process target process PID 1960 wrote to memory of 4964 1960 c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.exe cmd.exe PID 1960 wrote to memory of 4964 1960 c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.exe cmd.exe PID 1960 wrote to memory of 4964 1960 c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.exe cmd.exe PID 4964 wrote to memory of 2128 4964 cmd.exe powershell.exe PID 4964 wrote to memory of 2128 4964 cmd.exe powershell.exe PID 4964 wrote to memory of 2128 4964 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.exe"C:\Users\Admin\AppData\Local\Temp\c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C PowerShell "Start-Sleep 10; Remove-Item C:\Users\Admin\AppData\Local\Temp\c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 10; Remove-Item C:\Users\Admin\AppData\Local\Temp\c213f69f07e55e9934541c28d10b498d067def4936d0ffed342b9f8d052e20f6.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1960-134-0x0000000002060000-0x0000000002069000-memory.dmpFilesize
36KB
-
memory/1960-132-0x0000000002060000-0x0000000002069000-memory.dmpFilesize
36KB
-
memory/1960-131-0x0000000002060000-0x0000000002069000-memory.dmpFilesize
36KB
-
memory/2128-139-0x0000000005F20000-0x0000000005F86000-memory.dmpFilesize
408KB
-
memory/2128-135-0x0000000000000000-mapping.dmp
-
memory/2128-136-0x0000000002D90000-0x0000000002DC6000-memory.dmpFilesize
216KB
-
memory/2128-137-0x00000000057F0000-0x0000000005E18000-memory.dmpFilesize
6.2MB
-
memory/2128-138-0x0000000005700000-0x0000000005722000-memory.dmpFilesize
136KB
-
memory/2128-140-0x0000000005F90000-0x0000000005FF6000-memory.dmpFilesize
408KB
-
memory/2128-141-0x0000000006730000-0x000000000674E000-memory.dmpFilesize
120KB
-
memory/2128-142-0x0000000007DA0000-0x000000000841A000-memory.dmpFilesize
6.5MB
-
memory/2128-143-0x0000000006B80000-0x0000000006B9A000-memory.dmpFilesize
104KB
-
memory/2128-144-0x00000000079C0000-0x0000000007A56000-memory.dmpFilesize
600KB
-
memory/2128-145-0x0000000007920000-0x0000000007942000-memory.dmpFilesize
136KB
-
memory/2128-146-0x00000000089D0000-0x0000000008F74000-memory.dmpFilesize
5.6MB
-
memory/4964-133-0x0000000000000000-mapping.dmp