Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 05:03
Static task
static1
Behavioral task
behavioral1
Sample
f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe
Resource
win7-20220718-en
General
-
Target
f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe
-
Size
496KB
-
MD5
c66736eefb4fbdfdf30b4eac756b3a88
-
SHA1
3b5a68111e25eaa1eb60aaf09f4dfe6f31cf460f
-
SHA256
f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971
-
SHA512
2b512079049031c7061d767fe66f272b7b22a674b36d47a90e002c94de9dbddde545460b6add1a32a7d98b69c65571b50b56ece433219d5f2376f143b3e5b73a
Malware Config
Signatures
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/1292-57-0x0000000000620000-0x000000000064E000-memory.dmp trickbot_loader32 behavioral1/memory/1292-60-0x0000000000620000-0x000000000064E000-memory.dmp trickbot_loader32 behavioral1/memory/1292-68-0x0000000000620000-0x000000000064E000-memory.dmp trickbot_loader32 behavioral1/memory/1428-72-0x00000000002E0000-0x000000000030E000-memory.dmp trickbot_loader32 behavioral1/memory/1428-76-0x00000000002E0000-0x000000000030E000-memory.dmp trickbot_loader32 behavioral1/memory/1992-87-0x00000000003D0000-0x00000000003FE000-memory.dmp trickbot_loader32 behavioral1/memory/1992-91-0x00000000003D0000-0x00000000003FE000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exef04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exepid process 1428 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe -
Loads dropped DLL 2 IoCs
Processes:
f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exepid process 1292 f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe 1292 f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exedescription pid process Token: SeTcbPrivilege 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exef04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exef04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exepid process 1292 f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe 1292 f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe 1428 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe 1428 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exef04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exetaskeng.exef04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exedescription pid process target process PID 1292 wrote to memory of 1428 1292 f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe PID 1292 wrote to memory of 1428 1292 f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe PID 1292 wrote to memory of 1428 1292 f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe PID 1292 wrote to memory of 1428 1292 f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe PID 1428 wrote to memory of 2036 1428 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1428 wrote to memory of 2036 1428 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1428 wrote to memory of 2036 1428 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1428 wrote to memory of 2036 1428 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1428 wrote to memory of 2036 1428 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1428 wrote to memory of 2036 1428 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 904 wrote to memory of 1992 904 taskeng.exe f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe PID 904 wrote to memory of 1992 904 taskeng.exe f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe PID 904 wrote to memory of 1992 904 taskeng.exe f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe PID 904 wrote to memory of 1992 904 taskeng.exe f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe PID 1992 wrote to memory of 1916 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1992 wrote to memory of 1916 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1992 wrote to memory of 1916 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1992 wrote to memory of 1916 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1992 wrote to memory of 1916 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe PID 1992 wrote to memory of 1916 1992 f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe"C:\Users\Admin\AppData\Local\Temp\f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\speedlink\f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exeC:\Users\Admin\AppData\Roaming\speedlink\f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {59DC8C88-36FE-415F-83CC-A8B49B040E2A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\speedlink\f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exeC:\Users\Admin\AppData\Roaming\speedlink\f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\speedlink\f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exeFilesize
496KB
MD5c66736eefb4fbdfdf30b4eac756b3a88
SHA13b5a68111e25eaa1eb60aaf09f4dfe6f31cf460f
SHA256f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971
SHA5122b512079049031c7061d767fe66f272b7b22a674b36d47a90e002c94de9dbddde545460b6add1a32a7d98b69c65571b50b56ece433219d5f2376f143b3e5b73a
-
C:\Users\Admin\AppData\Roaming\speedlink\f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exeFilesize
496KB
MD5c66736eefb4fbdfdf30b4eac756b3a88
SHA13b5a68111e25eaa1eb60aaf09f4dfe6f31cf460f
SHA256f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971
SHA5122b512079049031c7061d767fe66f272b7b22a674b36d47a90e002c94de9dbddde545460b6add1a32a7d98b69c65571b50b56ece433219d5f2376f143b3e5b73a
-
C:\Users\Admin\AppData\Roaming\speedlink\f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exeFilesize
496KB
MD5c66736eefb4fbdfdf30b4eac756b3a88
SHA13b5a68111e25eaa1eb60aaf09f4dfe6f31cf460f
SHA256f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971
SHA5122b512079049031c7061d767fe66f272b7b22a674b36d47a90e002c94de9dbddde545460b6add1a32a7d98b69c65571b50b56ece433219d5f2376f143b3e5b73a
-
\Users\Admin\AppData\Roaming\speedlink\f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exeFilesize
496KB
MD5c66736eefb4fbdfdf30b4eac756b3a88
SHA13b5a68111e25eaa1eb60aaf09f4dfe6f31cf460f
SHA256f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971
SHA5122b512079049031c7061d767fe66f272b7b22a674b36d47a90e002c94de9dbddde545460b6add1a32a7d98b69c65571b50b56ece433219d5f2376f143b3e5b73a
-
\Users\Admin\AppData\Roaming\speedlink\f04bdc427f74f0034f104411898fd48278d872788899291f973c083c3d10b991.exeFilesize
496KB
MD5c66736eefb4fbdfdf30b4eac756b3a88
SHA13b5a68111e25eaa1eb60aaf09f4dfe6f31cf460f
SHA256f04bdc425f54f0034f104411696fd46258d652588897271f953c063c3d10b971
SHA5122b512079049031c7061d767fe66f272b7b22a674b36d47a90e002c94de9dbddde545460b6add1a32a7d98b69c65571b50b56ece433219d5f2376f143b3e5b73a
-
memory/1292-57-0x0000000000620000-0x000000000064E000-memory.dmpFilesize
184KB
-
memory/1292-59-0x0000000076921000-0x0000000076923000-memory.dmpFilesize
8KB
-
memory/1292-60-0x0000000000620000-0x000000000064E000-memory.dmpFilesize
184KB
-
memory/1292-68-0x0000000000620000-0x000000000064E000-memory.dmpFilesize
184KB
-
memory/1428-74-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB
-
memory/1428-63-0x0000000000000000-mapping.dmp
-
memory/1428-76-0x00000000002E0000-0x000000000030E000-memory.dmpFilesize
184KB
-
memory/1428-72-0x00000000002E0000-0x000000000030E000-memory.dmpFilesize
184KB
-
memory/1916-92-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/1916-90-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/1916-88-0x0000000000000000-mapping.dmp
-
memory/1992-89-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB
-
memory/1992-87-0x00000000003D0000-0x00000000003FE000-memory.dmpFilesize
184KB
-
memory/1992-79-0x0000000000000000-mapping.dmp
-
memory/1992-91-0x00000000003D0000-0x00000000003FE000-memory.dmpFilesize
184KB
-
memory/2036-73-0x0000000000000000-mapping.dmp
-
memory/2036-77-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/2036-75-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB