Analysis
-
max time kernel
570s -
max time network
576s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2022 19:43
Static task
static1
Behavioral task
behavioral1
Sample
cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe
Resource
win7-20220812-en
General
-
Target
cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe
-
Size
760KB
-
MD5
5e067587dd3c30aeb6098c4ed610b231
-
SHA1
f44daebb6d0ae3422789bd5a8a15e0ea689a0e43
-
SHA256
cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60
-
SHA512
8171e91bd36a9adc22f5836ede97ebe4f03f545267862c4dd69b492d9b3a2f34a21cd1c7ef3cc3777215d8c0da20119567fb168e7be866fa2d6e03040a4f3d17
-
SSDEEP
12288:ODoEtDoTDoO9upOnYIhGEiqJ74B5sw/8wUXJwEwSJh:ODLDuDmuYIhGET7PnwS/
Malware Config
Signatures
-
Trickbot x86 loader 7 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4616-135-0x00000000023F0000-0x0000000002421000-memory.dmp trickbot_loader32 behavioral2/memory/4616-137-0x00000000023F0000-0x0000000002421000-memory.dmp trickbot_loader32 behavioral2/memory/1856-146-0x0000000002220000-0x0000000002251000-memory.dmp trickbot_loader32 behavioral2/memory/4616-147-0x00000000023F0000-0x0000000002421000-memory.dmp trickbot_loader32 behavioral2/memory/1856-151-0x0000000002220000-0x0000000002251000-memory.dmp trickbot_loader32 behavioral2/memory/4508-160-0x0000000001B70000-0x0000000001BA1000-memory.dmp trickbot_loader32 behavioral2/memory/4508-164-0x0000000001B70000-0x0000000001BA1000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.execb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exepid process 1856 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe 4508 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe -
Modifies data under HKEY_USERS 40 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
svchost.execb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exesvchost.exedescription pid process Token: SeDebugPrivilege 1720 svchost.exe Token: SeDebugPrivilege 1720 svchost.exe Token: SeTcbPrivilege 4508 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe Token: SeDebugPrivilege 916 svchost.exe Token: SeDebugPrivilege 916 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.execb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.execb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exepid process 4616 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe 4616 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe 1856 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe 1856 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe 4508 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe 4508 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.execb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.execb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exedescription pid process target process PID 4616 wrote to memory of 1856 4616 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe PID 4616 wrote to memory of 1856 4616 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe PID 4616 wrote to memory of 1856 4616 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe PID 1856 wrote to memory of 1720 1856 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe svchost.exe PID 1856 wrote to memory of 1720 1856 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe svchost.exe PID 1856 wrote to memory of 1720 1856 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe svchost.exe PID 1856 wrote to memory of 1720 1856 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe svchost.exe PID 4508 wrote to memory of 916 4508 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe svchost.exe PID 4508 wrote to memory of 916 4508 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe svchost.exe PID 4508 wrote to memory of 916 4508 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe svchost.exe PID 4508 wrote to memory of 916 4508 cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe"C:\Users\Admin\AppData\Local\Temp\cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\monolib\cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exeC:\Users\Admin\AppData\Roaming\monolib\cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\monolib\cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exeC:\Users\Admin\AppData\Roaming\monolib\cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\monolib\cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exeFilesize
760KB
MD55e067587dd3c30aeb6098c4ed610b231
SHA1f44daebb6d0ae3422789bd5a8a15e0ea689a0e43
SHA256cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60
SHA5128171e91bd36a9adc22f5836ede97ebe4f03f545267862c4dd69b492d9b3a2f34a21cd1c7ef3cc3777215d8c0da20119567fb168e7be866fa2d6e03040a4f3d17
-
C:\Users\Admin\AppData\Roaming\monolib\cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exeFilesize
760KB
MD55e067587dd3c30aeb6098c4ed610b231
SHA1f44daebb6d0ae3422789bd5a8a15e0ea689a0e43
SHA256cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60
SHA5128171e91bd36a9adc22f5836ede97ebe4f03f545267862c4dd69b492d9b3a2f34a21cd1c7ef3cc3777215d8c0da20119567fb168e7be866fa2d6e03040a4f3d17
-
C:\Users\Admin\AppData\Roaming\monolib\cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60.exeFilesize
760KB
MD55e067587dd3c30aeb6098c4ed610b231
SHA1f44daebb6d0ae3422789bd5a8a15e0ea689a0e43
SHA256cb4dd27d08d6def2d5e180f2a99dfc510165aa25c431edd229485fe386818c60
SHA5128171e91bd36a9adc22f5836ede97ebe4f03f545267862c4dd69b492d9b3a2f34a21cd1c7ef3cc3777215d8c0da20119567fb168e7be866fa2d6e03040a4f3d17
-
memory/916-165-0x00000277903B0000-0x00000277903D4000-memory.dmpFilesize
144KB
-
memory/916-163-0x00000277903B0000-0x00000277903D4000-memory.dmpFilesize
144KB
-
memory/916-161-0x0000000000000000-mapping.dmp
-
memory/1720-152-0x00000150223B0000-0x00000150223D4000-memory.dmpFilesize
144KB
-
memory/1720-153-0x00000150223B0000-0x00000150223D4000-memory.dmpFilesize
144KB
-
memory/1720-149-0x0000000000000000-mapping.dmp
-
memory/1720-150-0x00000150223B0000-0x00000150223D4000-memory.dmpFilesize
144KB
-
memory/1856-146-0x0000000002220000-0x0000000002251000-memory.dmpFilesize
196KB
-
memory/1856-151-0x0000000002220000-0x0000000002251000-memory.dmpFilesize
196KB
-
memory/1856-148-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB
-
memory/1856-138-0x0000000000000000-mapping.dmp
-
memory/4508-160-0x0000000001B70000-0x0000000001BA1000-memory.dmpFilesize
196KB
-
memory/4508-162-0x0000000010000000-0x0000000010005000-memory.dmpFilesize
20KB
-
memory/4508-164-0x0000000001B70000-0x0000000001BA1000-memory.dmpFilesize
196KB
-
memory/4616-147-0x00000000023F0000-0x0000000002421000-memory.dmpFilesize
196KB
-
memory/4616-135-0x00000000023F0000-0x0000000002421000-memory.dmpFilesize
196KB
-
memory/4616-137-0x00000000023F0000-0x0000000002421000-memory.dmpFilesize
196KB