Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2022 09:26

General

  • Target

    Trikker/Bluebits.Trikker.exe

  • Size

    1.9MB

  • MD5

    58d38d849f1fa2e66e6c654384831ac3

  • SHA1

    7881a8ae37536924e43f0b540e11fd90347f1d6d

  • SHA256

    6bdf718863357339e9bbea3d658cc59d85338bfef074635e61333377fe23ab1f

  • SHA512

    81c56fe1d13a8d5d0a1faa06332c2e1133eecbb927400512966bfd675ec571237d3200afbb2f6d0ca220c7b328684a6fb66133978bc97c691d2ac2978cd55c9e

  • SSDEEP

    24576:4z0DYLyw5u8O5AQvwfAsiARx1nBq8BpaSsQO7Y7JZxC77BRTQTGqZ4edg8U25ilm:4z0DY88iOtXnBq8B4qOA28UcilyyX

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trikker\Bluebits.Trikker.exe
    "C:\Users\Admin\AppData\Local\Temp\Trikker\Bluebits.Trikker.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4884
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
    1⤵
      PID:3216

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4884-132-0x000001D56F480000-0x000001D56F666000-memory.dmp
      Filesize

      1.9MB

    • memory/4884-133-0x000001D56F9F0000-0x000001D56FA36000-memory.dmp
      Filesize

      280KB

    • memory/4884-134-0x000001D56FA40000-0x000001D56FA52000-memory.dmp
      Filesize

      72KB

    • memory/4884-135-0x00007FFA07300000-0x00007FFA07DC1000-memory.dmp
      Filesize

      10.8MB

    • memory/4884-136-0x000001D571480000-0x000001D57148C000-memory.dmp
      Filesize

      48KB

    • memory/4884-137-0x000001D5732A0000-0x000001D5733E8000-memory.dmp
      Filesize

      1.3MB

    • memory/4884-138-0x000001D573620000-0x000001D573756000-memory.dmp
      Filesize

      1.2MB

    • memory/4884-139-0x000001D571490000-0x000001D571498000-memory.dmp
      Filesize

      32KB

    • memory/4884-140-0x000001D5714D0000-0x000001D5714DA000-memory.dmp
      Filesize

      40KB

    • memory/4884-141-0x000001D573C40000-0x000001D573C5C000-memory.dmp
      Filesize

      112KB

    • memory/4884-142-0x000001D577CF0000-0x000001D577CF8000-memory.dmp
      Filesize

      32KB

    • memory/4884-143-0x000001D578420000-0x000001D578458000-memory.dmp
      Filesize

      224KB

    • memory/4884-144-0x000001D577EB0000-0x000001D577EBE000-memory.dmp
      Filesize

      56KB

    • memory/4884-145-0x000001D571469000-0x000001D57146F000-memory.dmp
      Filesize

      24KB

    • memory/4884-146-0x00007FFA07300000-0x00007FFA07DC1000-memory.dmp
      Filesize

      10.8MB