Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21-10-2022 00:52
Behavioral task
behavioral1
Sample
tb.exe
Resource
win7-20220901-en
General
-
Target
tb.exe
-
Size
163KB
-
MD5
a5b4f5aa908d9d51cfeec04116b8ace4
-
SHA1
62d6564ffde2940e30db9def1905becd7840cf05
-
SHA256
7d6f0dab906d853673b009003fb407769490faeb832efab18a684f426db421b2
-
SHA512
c884f0f28752b9693ea9733a2b66fffcba3b51b950a7c6cbc7fe61370ec3437d1fcfcd571ddef63f5d9f1af42aa3fa5faf91bc1dc3bfbad5be2afc6dfcb345e2
-
SSDEEP
3072:M+ucZmcRrrtlxqay6w9HNsKElYqJZZQ/vjk75x3iLMzf7zfGJwJ1QfqQ:M+BZhnldm9lshJUqN7z+JsQCQ
Malware Config
Signatures
-
Trickbot x86 loader 2 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/1416-62-0x0000000000400000-0x0000000000429000-memory.dmp trickbot_loader32 behavioral1/memory/1240-77-0x0000000000400000-0x0000000000429000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
tb.exepid process 1240 tb.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
tb.exepid process 1416 tb.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exepid process 684 sc.exe 880 sc.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
tb.exepowershell.exepid process 1416 tb.exe 1416 tb.exe 1416 tb.exe 580 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 580 powershell.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
tb.execmd.execmd.execmd.exetb.exedescription pid process target process PID 1416 wrote to memory of 900 1416 tb.exe cmd.exe PID 1416 wrote to memory of 900 1416 tb.exe cmd.exe PID 1416 wrote to memory of 900 1416 tb.exe cmd.exe PID 1416 wrote to memory of 900 1416 tb.exe cmd.exe PID 1416 wrote to memory of 1780 1416 tb.exe cmd.exe PID 1416 wrote to memory of 1780 1416 tb.exe cmd.exe PID 1416 wrote to memory of 1780 1416 tb.exe cmd.exe PID 1416 wrote to memory of 1780 1416 tb.exe cmd.exe PID 1416 wrote to memory of 1912 1416 tb.exe cmd.exe PID 1416 wrote to memory of 1912 1416 tb.exe cmd.exe PID 1416 wrote to memory of 1912 1416 tb.exe cmd.exe PID 1416 wrote to memory of 1912 1416 tb.exe cmd.exe PID 900 wrote to memory of 880 900 cmd.exe sc.exe PID 900 wrote to memory of 880 900 cmd.exe sc.exe PID 900 wrote to memory of 880 900 cmd.exe sc.exe PID 900 wrote to memory of 880 900 cmd.exe sc.exe PID 1416 wrote to memory of 1240 1416 tb.exe tb.exe PID 1416 wrote to memory of 1240 1416 tb.exe tb.exe PID 1416 wrote to memory of 1240 1416 tb.exe tb.exe PID 1416 wrote to memory of 1240 1416 tb.exe tb.exe PID 1780 wrote to memory of 684 1780 cmd.exe sc.exe PID 1780 wrote to memory of 684 1780 cmd.exe sc.exe PID 1780 wrote to memory of 684 1780 cmd.exe sc.exe PID 1780 wrote to memory of 684 1780 cmd.exe sc.exe PID 1912 wrote to memory of 580 1912 cmd.exe powershell.exe PID 1912 wrote to memory of 580 1912 cmd.exe powershell.exe PID 1912 wrote to memory of 580 1912 cmd.exe powershell.exe PID 1912 wrote to memory of 580 1912 cmd.exe powershell.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe PID 1240 wrote to memory of 1828 1240 tb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tb.exe"C:\Users\Admin\AppData\Local\Temp\tb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\WNetval\tb.exeC:\Users\Admin\AppData\Roaming\WNetval\tb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WNetval\tb.exeFilesize
163KB
MD5a5b4f5aa908d9d51cfeec04116b8ace4
SHA162d6564ffde2940e30db9def1905becd7840cf05
SHA2567d6f0dab906d853673b009003fb407769490faeb832efab18a684f426db421b2
SHA512c884f0f28752b9693ea9733a2b66fffcba3b51b950a7c6cbc7fe61370ec3437d1fcfcd571ddef63f5d9f1af42aa3fa5faf91bc1dc3bfbad5be2afc6dfcb345e2
-
\Users\Admin\AppData\Roaming\WNetval\tb.exeFilesize
163KB
MD5a5b4f5aa908d9d51cfeec04116b8ace4
SHA162d6564ffde2940e30db9def1905becd7840cf05
SHA2567d6f0dab906d853673b009003fb407769490faeb832efab18a684f426db421b2
SHA512c884f0f28752b9693ea9733a2b66fffcba3b51b950a7c6cbc7fe61370ec3437d1fcfcd571ddef63f5d9f1af42aa3fa5faf91bc1dc3bfbad5be2afc6dfcb345e2
-
memory/580-79-0x0000000073BC0000-0x000000007416B000-memory.dmpFilesize
5.7MB
-
memory/580-78-0x0000000073BC0000-0x000000007416B000-memory.dmpFilesize
5.7MB
-
memory/580-64-0x0000000000000000-mapping.dmp
-
memory/684-61-0x0000000000000000-mapping.dmp
-
memory/880-59-0x0000000000000000-mapping.dmp
-
memory/900-55-0x0000000000000000-mapping.dmp
-
memory/1240-68-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/1240-60-0x0000000000000000-mapping.dmp
-
memory/1240-77-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1416-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1416-54-0x0000000074DC1000-0x0000000074DC3000-memory.dmpFilesize
8KB
-
memory/1780-56-0x0000000000000000-mapping.dmp
-
memory/1828-71-0x0000000000000000-mapping.dmp
-
memory/1828-73-0x0000000010000000-0x000000001001F000-memory.dmpFilesize
124KB
-
memory/1912-57-0x0000000000000000-mapping.dmp