Analysis
-
max time kernel
114s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 00:52
Behavioral task
behavioral1
Sample
tb.exe
Resource
win7-20220901-en
General
-
Target
tb.exe
-
Size
163KB
-
MD5
a5b4f5aa908d9d51cfeec04116b8ace4
-
SHA1
62d6564ffde2940e30db9def1905becd7840cf05
-
SHA256
7d6f0dab906d853673b009003fb407769490faeb832efab18a684f426db421b2
-
SHA512
c884f0f28752b9693ea9733a2b66fffcba3b51b950a7c6cbc7fe61370ec3437d1fcfcd571ddef63f5d9f1af42aa3fa5faf91bc1dc3bfbad5be2afc6dfcb345e2
-
SSDEEP
3072:M+ucZmcRrrtlxqay6w9HNsKElYqJZZQ/vjk75x3iLMzf7zfGJwJ1QfqQ:M+BZhnldm9lshJUqN7z+JsQCQ
Malware Config
Signatures
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2444-132-0x0000000000400000-0x0000000000429000-memory.dmp trickbot_loader32 behavioral2/memory/2444-136-0x0000000000400000-0x0000000000429000-memory.dmp trickbot_loader32 behavioral2/memory/5012-147-0x0000000000400000-0x0000000000429000-memory.dmp trickbot_loader32 behavioral2/memory/4484-149-0x0000000000400000-0x0000000000429000-memory.dmp trickbot_loader32 behavioral2/memory/4484-160-0x0000000000400000-0x0000000000429000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
tb.exetb.exepid process 5012 tb.exe 4484 tb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tb.exedescription pid process Token: SeTcbPrivilege 4484 tb.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
tb.exetb.exetb.exedescription pid process target process PID 2444 wrote to memory of 5012 2444 tb.exe tb.exe PID 2444 wrote to memory of 5012 2444 tb.exe tb.exe PID 2444 wrote to memory of 5012 2444 tb.exe tb.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 5012 wrote to memory of 368 5012 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe PID 4484 wrote to memory of 1052 4484 tb.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tb.exe"C:\Users\Admin\AppData\Local\Temp\tb.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WNetval\tb.exeC:\Users\Admin\AppData\Roaming\WNetval\tb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\WNetval\tb.exeC:\Users\Admin\AppData\Roaming\WNetval\tb.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WNetval\tb.exeFilesize
163KB
MD5a5b4f5aa908d9d51cfeec04116b8ace4
SHA162d6564ffde2940e30db9def1905becd7840cf05
SHA2567d6f0dab906d853673b009003fb407769490faeb832efab18a684f426db421b2
SHA512c884f0f28752b9693ea9733a2b66fffcba3b51b950a7c6cbc7fe61370ec3437d1fcfcd571ddef63f5d9f1af42aa3fa5faf91bc1dc3bfbad5be2afc6dfcb345e2
-
C:\Users\Admin\AppData\Roaming\WNetval\tb.exeFilesize
163KB
MD5a5b4f5aa908d9d51cfeec04116b8ace4
SHA162d6564ffde2940e30db9def1905becd7840cf05
SHA2567d6f0dab906d853673b009003fb407769490faeb832efab18a684f426db421b2
SHA512c884f0f28752b9693ea9733a2b66fffcba3b51b950a7c6cbc7fe61370ec3437d1fcfcd571ddef63f5d9f1af42aa3fa5faf91bc1dc3bfbad5be2afc6dfcb345e2
-
C:\Users\Admin\AppData\Roaming\WNetval\tb.exeFilesize
163KB
MD5a5b4f5aa908d9d51cfeec04116b8ace4
SHA162d6564ffde2940e30db9def1905becd7840cf05
SHA2567d6f0dab906d853673b009003fb407769490faeb832efab18a684f426db421b2
SHA512c884f0f28752b9693ea9733a2b66fffcba3b51b950a7c6cbc7fe61370ec3437d1fcfcd571ddef63f5d9f1af42aa3fa5faf91bc1dc3bfbad5be2afc6dfcb345e2
-
memory/368-141-0x0000000000000000-mapping.dmp
-
memory/368-143-0x0000000010000000-0x000000001001F000-memory.dmpFilesize
124KB
-
memory/1052-154-0x0000000000000000-mapping.dmp
-
memory/2444-136-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2444-132-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4484-149-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4484-160-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/5012-133-0x0000000000000000-mapping.dmp
-
memory/5012-138-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/5012-147-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB