Analysis
-
max time kernel
32s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 13:21
Static task
static1
Behavioral task
behavioral1
Sample
0f466eebf214bea517664f3fb34099deb9f12f7910c0d962d7d6957c8ca09362.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
General
-
Target
0f466eebf214bea517664f3fb34099deb9f12f7910c0d962d7d6957c8ca09362.exe
-
Size
314KB
-
MD5
2da1d4cc6c7a815a9b644475060c8c85
-
SHA1
305864b19b3bacea25243bac415264b401e34d6b
-
SHA256
0f466eebf214bea517664f3fb34099deb9f12f7910c0d962d7d6957c8ca09362
-
SHA512
f9f47ac6a4abe7ab2cb91d0f4e6f20b4dc7c28b83df588010191adb30031865e41cc0fff8f98c4226085b0bd9c2e1375bfa5f1e4c58868b3b9380aeaba198ed2
-
SSDEEP
6144:Pu1TYYRYx0SxYYq1eIk/M9W9MlBkwaUVAv4zDKGvfYYwXe:QYYXSqC/Mw9MjxAvQXYZXe
Malware Config
Signatures
-
Trickbot x86 loader 2 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/1692-55-0x00000000000F0000-0x000000000011B000-memory.dmp trickbot_loader32 behavioral1/memory/1692-56-0x00000000000F0000-0x000000000011B000-memory.dmp trickbot_loader32