Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2022 09:26
Behavioral task
behavioral1
Sample
Trikker/Bluebits.Trikker.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Trikker/Bluebits.Trikker.exe
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
Trikker/Bluebits.Trikker.exe
Resource
win10v2004-20220812-en
General
-
Target
Trikker/Bluebits.Trikker.exe
-
Size
1.9MB
-
MD5
58d38d849f1fa2e66e6c654384831ac3
-
SHA1
7881a8ae37536924e43f0b540e11fd90347f1d6d
-
SHA256
6bdf718863357339e9bbea3d658cc59d85338bfef074635e61333377fe23ab1f
-
SHA512
81c56fe1d13a8d5d0a1faa06332c2e1133eecbb927400512966bfd675ec571237d3200afbb2f6d0ca220c7b328684a6fb66133978bc97c691d2ac2978cd55c9e
-
SSDEEP
24576:4z0DYLyw5u8O5AQvwfAsiARx1nBq8BpaSsQO7Y7JZxC77BRTQTGqZ4edg8U25ilm:4z0DY88iOtXnBq8B4qOA28UcilyyX
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Bluebits.Trikker.exepid process 4884 Bluebits.Trikker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Bluebits.Trikker.exedescription pid process Token: SeDebugPrivilege 4884 Bluebits.Trikker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trikker\Bluebits.Trikker.exe"C:\Users\Admin\AppData\Local\Temp\Trikker\Bluebits.Trikker.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4884-132-0x000001D56F480000-0x000001D56F666000-memory.dmpFilesize
1.9MB
-
memory/4884-133-0x000001D56F9F0000-0x000001D56FA36000-memory.dmpFilesize
280KB
-
memory/4884-134-0x000001D56FA40000-0x000001D56FA52000-memory.dmpFilesize
72KB
-
memory/4884-135-0x00007FFA07300000-0x00007FFA07DC1000-memory.dmpFilesize
10.8MB
-
memory/4884-136-0x000001D571480000-0x000001D57148C000-memory.dmpFilesize
48KB
-
memory/4884-137-0x000001D5732A0000-0x000001D5733E8000-memory.dmpFilesize
1.3MB
-
memory/4884-138-0x000001D573620000-0x000001D573756000-memory.dmpFilesize
1.2MB
-
memory/4884-139-0x000001D571490000-0x000001D571498000-memory.dmpFilesize
32KB
-
memory/4884-140-0x000001D5714D0000-0x000001D5714DA000-memory.dmpFilesize
40KB
-
memory/4884-141-0x000001D573C40000-0x000001D573C5C000-memory.dmpFilesize
112KB
-
memory/4884-142-0x000001D577CF0000-0x000001D577CF8000-memory.dmpFilesize
32KB
-
memory/4884-143-0x000001D578420000-0x000001D578458000-memory.dmpFilesize
224KB
-
memory/4884-144-0x000001D577EB0000-0x000001D577EBE000-memory.dmpFilesize
56KB
-
memory/4884-145-0x000001D571469000-0x000001D57146F000-memory.dmpFilesize
24KB
-
memory/4884-146-0x00007FFA07300000-0x00007FFA07DC1000-memory.dmpFilesize
10.8MB