Analysis
-
max time kernel
106s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 08:57
Static task
static1
Behavioral task
behavioral1
Sample
8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe
Resource
win7-20220715-en
General
-
Target
8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe
-
Size
628KB
-
MD5
21b485281c51911c061f809c80f68ea9
-
SHA1
4da7ec45cfff4bc2c62ec1610420a179f30f4994
-
SHA256
8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043
-
SHA512
5a5066d8c50b68903e49c9b4a722dab419a2e3a7cf534bd912c620c707abac86154ef87c3b906542c48323076912a95b0e135809fdcc6edc968216bdef6808b3
Malware Config
Signatures
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/1164-55-0x0000000001C90000-0x0000000001CBE000-memory.dmp trickbot_loader32 behavioral1/memory/1164-65-0x0000000001C60000-0x0000000001C8D000-memory.dmp trickbot_loader32 behavioral1/memory/1164-66-0x0000000001C91000-0x0000000001CBD000-memory.dmp trickbot_loader32 behavioral1/memory/872-67-0x0000000000281000-0x00000000002AD000-memory.dmp trickbot_loader32 behavioral1/memory/896-78-0x0000000000641000-0x000000000066D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exepid process 872 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe -
Loads dropped DLL 2 IoCs
Processes:
8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exepid process 1164 8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe 1164 8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exedescription pid process Token: SeTcbPrivilege 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exepid process 1164 8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe 1164 8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe 872 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe 872 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exetaskeng.exe8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exedescription pid process target process PID 1164 wrote to memory of 872 1164 8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe PID 1164 wrote to memory of 872 1164 8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe PID 1164 wrote to memory of 872 1164 8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe PID 1164 wrote to memory of 872 1164 8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe PID 872 wrote to memory of 1948 872 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 872 wrote to memory of 1948 872 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 872 wrote to memory of 1948 872 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 872 wrote to memory of 1948 872 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 872 wrote to memory of 1948 872 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 872 wrote to memory of 1948 872 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 1664 wrote to memory of 896 1664 taskeng.exe 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe PID 1664 wrote to memory of 896 1664 taskeng.exe 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe PID 1664 wrote to memory of 896 1664 taskeng.exe 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe PID 1664 wrote to memory of 896 1664 taskeng.exe 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe PID 896 wrote to memory of 112 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 896 wrote to memory of 112 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 896 wrote to memory of 112 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 896 wrote to memory of 112 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 896 wrote to memory of 112 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe PID 896 wrote to memory of 112 896 8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe"C:\Users\Admin\AppData\Local\Temp\8c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sysdefragler\8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exeC:\Users\Admin\AppData\Roaming\sysdefragler\8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {6C8B528D-ED60-4760-9C8D-6B0752CE5482} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\sysdefragler\8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exeC:\Users\Admin\AppData\Roaming\sysdefragler\8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\sysdefragler\8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exeFilesize
628KB
MD521b485281c51911c061f809c80f68ea9
SHA14da7ec45cfff4bc2c62ec1610420a179f30f4994
SHA2568c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043
SHA5125a5066d8c50b68903e49c9b4a722dab419a2e3a7cf534bd912c620c707abac86154ef87c3b906542c48323076912a95b0e135809fdcc6edc968216bdef6808b3
-
C:\Users\Admin\AppData\Roaming\sysdefragler\8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exeFilesize
628KB
MD521b485281c51911c061f809c80f68ea9
SHA14da7ec45cfff4bc2c62ec1610420a179f30f4994
SHA2568c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043
SHA5125a5066d8c50b68903e49c9b4a722dab419a2e3a7cf534bd912c620c707abac86154ef87c3b906542c48323076912a95b0e135809fdcc6edc968216bdef6808b3
-
C:\Users\Admin\AppData\Roaming\sysdefragler\8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exeFilesize
628KB
MD521b485281c51911c061f809c80f68ea9
SHA14da7ec45cfff4bc2c62ec1610420a179f30f4994
SHA2568c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043
SHA5125a5066d8c50b68903e49c9b4a722dab419a2e3a7cf534bd912c620c707abac86154ef87c3b906542c48323076912a95b0e135809fdcc6edc968216bdef6808b3
-
\Users\Admin\AppData\Roaming\sysdefragler\8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exeFilesize
628KB
MD521b485281c51911c061f809c80f68ea9
SHA14da7ec45cfff4bc2c62ec1610420a179f30f4994
SHA2568c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043
SHA5125a5066d8c50b68903e49c9b4a722dab419a2e3a7cf534bd912c620c707abac86154ef87c3b906542c48323076912a95b0e135809fdcc6edc968216bdef6808b3
-
\Users\Admin\AppData\Roaming\sysdefragler\8c100c78223478b9ca901a9b8f09349a994c3e7fc78a82af897ec1acb202b043.exeFilesize
628KB
MD521b485281c51911c061f809c80f68ea9
SHA14da7ec45cfff4bc2c62ec1610420a179f30f4994
SHA2568c100c58223458b7ca901a7b8f09349a774c3e5fc58a62af875ec1acb202b043
SHA5125a5066d8c50b68903e49c9b4a722dab419a2e3a7cf534bd912c620c707abac86154ef87c3b906542c48323076912a95b0e135809fdcc6edc968216bdef6808b3
-
memory/112-81-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/112-80-0x0000000000060000-0x0000000000080000-memory.dmpFilesize
128KB
-
memory/112-77-0x0000000000000000-mapping.dmp
-
memory/872-67-0x0000000000281000-0x00000000002AD000-memory.dmpFilesize
176KB
-
memory/872-68-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB
-
memory/872-59-0x0000000000000000-mapping.dmp
-
memory/896-72-0x0000000000000000-mapping.dmp
-
memory/896-79-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB
-
memory/896-78-0x0000000000641000-0x000000000066D000-memory.dmpFilesize
176KB
-
memory/1164-54-0x0000000076021000-0x0000000076023000-memory.dmpFilesize
8KB
-
memory/1164-55-0x0000000001C90000-0x0000000001CBE000-memory.dmpFilesize
184KB
-
memory/1164-66-0x0000000001C91000-0x0000000001CBD000-memory.dmpFilesize
176KB
-
memory/1164-65-0x0000000001C60000-0x0000000001C8D000-memory.dmpFilesize
180KB
-
memory/1948-70-0x00000000000E0000-0x0000000000100000-memory.dmpFilesize
128KB
-
memory/1948-69-0x00000000000E0000-0x0000000000100000-memory.dmpFilesize
128KB
-
memory/1948-64-0x0000000000000000-mapping.dmp