Analysis
-
max time kernel
133s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 06:24
Static task
static1
Behavioral task
behavioral1
Sample
94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe
Resource
win7-20220715-en
General
-
Target
94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe
-
Size
580KB
-
MD5
899548beb4e249e4c4293241fb6fd4bc
-
SHA1
35ec596c9fccf41d961d87ad62e758cf7798131b
-
SHA256
94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d
-
SHA512
9e92478f32d848aabe07b1f73e1d13b4b8770bac309fb4fd30d65b5e0b1437b290639e56d4c1362ddd9d6e5276bcd692d7379d9337d32a6e64cf78b20db42932
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/788-61-0x00000000004A0000-0x00000000004CD000-memory.dmp trickbot_loader32 behavioral1/memory/788-63-0x0000000000250000-0x000000000027C000-memory.dmp trickbot_loader32 behavioral1/memory/788-64-0x00000000004A1000-0x00000000004CC000-memory.dmp trickbot_loader32 behavioral1/memory/788-66-0x00000000004A1000-0x00000000004CC000-memory.dmp trickbot_loader32 behavioral1/memory/1756-75-0x00000000003B1000-0x00000000003DC000-memory.dmp trickbot_loader32 behavioral1/memory/1756-77-0x00000000003B1000-0x00000000003DC000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
هدميملئظائراصوةلطنشدنرلعمكأا.exeهدميملئظائراصوةلطنشدنرلعمكأا.exepid process 788 هدميملئظائراصوةلطنشدنرلعمكأا.exe 1756 هدميملئظائراصوةلطنشدنرلعمكأا.exe -
Loads dropped DLL 2 IoCs
Processes:
94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exepid process 2008 94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe 2008 94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 1920 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exeهدميملئظائراصوةلطنشدنرلعمكأا.exeهدميملئظائراصوةلطنشدنرلعمكأا.exepid process 2008 94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe 788 هدميملئظائراصوةلطنشدنرلعمكأا.exe 1756 هدميملئظائراصوةلطنشدنرلعمكأا.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exeهدميملئظائراصوةلطنشدنرلعمكأا.exetaskeng.exeهدميملئظائراصوةلطنشدنرلعمكأا.exedescription pid process target process PID 2008 wrote to memory of 788 2008 94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe هدميملئظائراصوةلطنشدنرلعمكأا.exe PID 2008 wrote to memory of 788 2008 94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe هدميملئظائراصوةلطنشدنرلعمكأا.exe PID 2008 wrote to memory of 788 2008 94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe هدميملئظائراصوةلطنشدنرلعمكأا.exe PID 2008 wrote to memory of 788 2008 94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe هدميملئظائراصوةلطنشدنرلعمكأا.exe PID 788 wrote to memory of 1260 788 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 788 wrote to memory of 1260 788 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 788 wrote to memory of 1260 788 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 788 wrote to memory of 1260 788 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 788 wrote to memory of 1260 788 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 788 wrote to memory of 1260 788 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 1628 wrote to memory of 1756 1628 taskeng.exe هدميملئظائراصوةلطنشدنرلعمكأا.exe PID 1628 wrote to memory of 1756 1628 taskeng.exe هدميملئظائراصوةلطنشدنرلعمكأا.exe PID 1628 wrote to memory of 1756 1628 taskeng.exe هدميملئظائراصوةلطنشدنرلعمكأا.exe PID 1628 wrote to memory of 1756 1628 taskeng.exe هدميملئظائراصوةلطنشدنرلعمكأا.exe PID 1756 wrote to memory of 1920 1756 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 1756 wrote to memory of 1920 1756 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 1756 wrote to memory of 1920 1756 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 1756 wrote to memory of 1920 1756 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 1756 wrote to memory of 1920 1756 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe PID 1756 wrote to memory of 1920 1756 هدميملئظائراصوةلطنشدنرلعمكأا.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe"C:\Users\Admin\AppData\Local\Temp\94804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\هدميملئظائراصوةلطنشدنرلعمكأا.exe"C:\ProgramData\هدميملئظائراصوةلطنشدنرلعمكأا.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {67DE4EC3-771E-4030-AF3B-6EA560A393E6} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\netcloud\هدميملئظائراصوةلطنشدنرلعمكأا.exeC:\Users\Admin\AppData\Roaming\netcloud\هدميملئظائراصوةلطنشدنرلعمكأا.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\هدميملئظائراصوةلطنشدنرلعمكأا.exeFilesize
580KB
MD5899548beb4e249e4c4293241fb6fd4bc
SHA135ec596c9fccf41d961d87ad62e758cf7798131b
SHA25694804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d
SHA5129e92478f32d848aabe07b1f73e1d13b4b8770bac309fb4fd30d65b5e0b1437b290639e56d4c1362ddd9d6e5276bcd692d7379d9337d32a6e64cf78b20db42932
-
C:\ProgramData\هدميملئظائراصوةلطنشدنرلعمكأا.exeFilesize
580KB
MD5899548beb4e249e4c4293241fb6fd4bc
SHA135ec596c9fccf41d961d87ad62e758cf7798131b
SHA25694804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d
SHA5129e92478f32d848aabe07b1f73e1d13b4b8770bac309fb4fd30d65b5e0b1437b290639e56d4c1362ddd9d6e5276bcd692d7379d9337d32a6e64cf78b20db42932
-
C:\Users\Admin\AppData\Roaming\netcloud\هدميملئظائراصوةلطنشدنرلعمكأا.exeFilesize
580KB
MD5899548beb4e249e4c4293241fb6fd4bc
SHA135ec596c9fccf41d961d87ad62e758cf7798131b
SHA25694804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d
SHA5129e92478f32d848aabe07b1f73e1d13b4b8770bac309fb4fd30d65b5e0b1437b290639e56d4c1362ddd9d6e5276bcd692d7379d9337d32a6e64cf78b20db42932
-
C:\Users\Admin\AppData\Roaming\netcloud\هدميملئظائراصوةلطنشدنرلعمكأا.exeFilesize
580KB
MD5899548beb4e249e4c4293241fb6fd4bc
SHA135ec596c9fccf41d961d87ad62e758cf7798131b
SHA25694804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d
SHA5129e92478f32d848aabe07b1f73e1d13b4b8770bac309fb4fd30d65b5e0b1437b290639e56d4c1362ddd9d6e5276bcd692d7379d9337d32a6e64cf78b20db42932
-
\ProgramData\هدميملئظائراصوةلطنشدنرلعمكأا.exeFilesize
580KB
MD5899548beb4e249e4c4293241fb6fd4bc
SHA135ec596c9fccf41d961d87ad62e758cf7798131b
SHA25694804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d
SHA5129e92478f32d848aabe07b1f73e1d13b4b8770bac309fb4fd30d65b5e0b1437b290639e56d4c1362ddd9d6e5276bcd692d7379d9337d32a6e64cf78b20db42932
-
\ProgramData\هدميملئظائراصوةلطنشدنرلعمكأا.exeFilesize
580KB
MD5899548beb4e249e4c4293241fb6fd4bc
SHA135ec596c9fccf41d961d87ad62e758cf7798131b
SHA25694804e1d517646d18a96c39bfa216bedcf6feb430875ce7ae7a5336a530e396d
SHA5129e92478f32d848aabe07b1f73e1d13b4b8770bac309fb4fd30d65b5e0b1437b290639e56d4c1362ddd9d6e5276bcd692d7379d9337d32a6e64cf78b20db42932
-
memory/788-57-0x0000000000000000-mapping.dmp
-
memory/788-61-0x00000000004A0000-0x00000000004CD000-memory.dmpFilesize
180KB
-
memory/788-63-0x0000000000250000-0x000000000027C000-memory.dmpFilesize
176KB
-
memory/788-64-0x00000000004A1000-0x00000000004CC000-memory.dmpFilesize
172KB
-
memory/788-66-0x00000000004A1000-0x00000000004CC000-memory.dmpFilesize
172KB
-
memory/1260-68-0x0000000000060000-0x000000000007E000-memory.dmpFilesize
120KB
-
memory/1260-67-0x0000000000060000-0x000000000007E000-memory.dmpFilesize
120KB
-
memory/1260-65-0x0000000000000000-mapping.dmp
-
memory/1756-70-0x0000000000000000-mapping.dmp
-
memory/1756-75-0x00000000003B1000-0x00000000003DC000-memory.dmpFilesize
172KB
-
memory/1756-77-0x00000000003B1000-0x00000000003DC000-memory.dmpFilesize
172KB
-
memory/1920-76-0x0000000000000000-mapping.dmp
-
memory/1920-78-0x0000000000060000-0x000000000007E000-memory.dmpFilesize
120KB
-
memory/1920-79-0x0000000000060000-0x000000000007E000-memory.dmpFilesize
120KB
-
memory/2008-54-0x0000000075791000-0x0000000075793000-memory.dmpFilesize
8KB