Analysis
-
max time kernel
151s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 05:03
Static task
static1
Behavioral task
behavioral1
Sample
6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe
Resource
win7-20220718-en
General
-
Target
6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe
-
Size
748KB
-
MD5
955a58eb796749424e76bc559da71d99
-
SHA1
0c4c46797d0975c03b49f9f31b74d9b3e72539c7
-
SHA256
6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac
-
SHA512
5d715ccb22de3a8dc283635a9285bf83273c84af62e268d79b93d28bac0aa0310067d895d7c0b53a1b2ecd1b196c342c0b80074935b5480ec7419232cb2027f0
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/1828-55-0x00000000002C0000-0x00000000002ED000-memory.dmp trickbot_loader32 behavioral1/memory/1828-56-0x0000000000290000-0x00000000002BD000-memory.dmp trickbot_loader32 behavioral1/memory/1828-57-0x00000000002C1000-0x00000000002ED000-memory.dmp trickbot_loader32 behavioral1/memory/1828-59-0x00000000002C1000-0x00000000002ED000-memory.dmp trickbot_loader32 behavioral1/memory/1176-68-0x00000000001E1000-0x000000000020D000-memory.dmp trickbot_loader32 behavioral1/memory/1176-70-0x00000000001E1000-0x000000000020D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exepid process 1176 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 1380 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exepid process 1828 6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe 1176 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exetaskeng.exe8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exedescription pid process target process PID 1828 wrote to memory of 2004 1828 6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe svchost.exe PID 1828 wrote to memory of 2004 1828 6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe svchost.exe PID 1828 wrote to memory of 2004 1828 6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe svchost.exe PID 1828 wrote to memory of 2004 1828 6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe svchost.exe PID 1828 wrote to memory of 2004 1828 6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe svchost.exe PID 1828 wrote to memory of 2004 1828 6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe svchost.exe PID 1200 wrote to memory of 1176 1200 taskeng.exe 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe PID 1200 wrote to memory of 1176 1200 taskeng.exe 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe PID 1200 wrote to memory of 1176 1200 taskeng.exe 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe PID 1200 wrote to memory of 1176 1200 taskeng.exe 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe PID 1176 wrote to memory of 1380 1176 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe svchost.exe PID 1176 wrote to memory of 1380 1176 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe svchost.exe PID 1176 wrote to memory of 1380 1176 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe svchost.exe PID 1176 wrote to memory of 1380 1176 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe svchost.exe PID 1176 wrote to memory of 1380 1176 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe svchost.exe PID 1176 wrote to memory of 1380 1176 8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe"C:\Users\Admin\AppData\Local\Temp\6a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {360B10D4-3F45-444D-8C5E-64D4BB3CD4ED} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\taskhealth\8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exeC:\Users\Admin\AppData\Roaming\taskhealth\8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\taskhealth\8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exeFilesize
748KB
MD5955a58eb796749424e76bc559da71d99
SHA10c4c46797d0975c03b49f9f31b74d9b3e72539c7
SHA2566a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac
SHA5125d715ccb22de3a8dc283635a9285bf83273c84af62e268d79b93d28bac0aa0310067d895d7c0b53a1b2ecd1b196c342c0b80074935b5480ec7419232cb2027f0
-
C:\Users\Admin\AppData\Roaming\taskhealth\8a7c0112890ffb39a840a1800f08b9a23c8973ff8ba172f14da8cdbde0d79cac.exeFilesize
748KB
MD5955a58eb796749424e76bc559da71d99
SHA10c4c46797d0975c03b49f9f31b74d9b3e72539c7
SHA2566a5c0112870ffb39a840a1800f08b7a23c8753ff6ba152f14da6cdbde0d57cac
SHA5125d715ccb22de3a8dc283635a9285bf83273c84af62e268d79b93d28bac0aa0310067d895d7c0b53a1b2ecd1b196c342c0b80074935b5480ec7419232cb2027f0
-
memory/1176-68-0x00000000001E1000-0x000000000020D000-memory.dmpFilesize
176KB
-
memory/1176-70-0x00000000001E1000-0x000000000020D000-memory.dmpFilesize
176KB
-
memory/1176-64-0x0000000000000000-mapping.dmp
-
memory/1380-71-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/1380-69-0x0000000000000000-mapping.dmp
-
memory/1380-72-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/1828-57-0x00000000002C1000-0x00000000002ED000-memory.dmpFilesize
176KB
-
memory/1828-59-0x00000000002C1000-0x00000000002ED000-memory.dmpFilesize
176KB
-
memory/1828-60-0x0000000010001000-0x0000000010005000-memory.dmpFilesize
16KB
-
memory/1828-54-0x0000000075871000-0x0000000075873000-memory.dmpFilesize
8KB
-
memory/1828-56-0x0000000000290000-0x00000000002BD000-memory.dmpFilesize
180KB
-
memory/1828-55-0x00000000002C0000-0x00000000002ED000-memory.dmpFilesize
180KB
-
memory/2004-58-0x0000000000000000-mapping.dmp
-
memory/2004-62-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/2004-61-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB