Analysis
-
max time kernel
189s -
max time network
218s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 16:06
Static task
static1
Behavioral task
behavioral1
Sample
1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534.exe
Resource
win10v2004-20221111-en
General
-
Target
1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534.exe
-
Size
299KB
-
MD5
fa04235f2c1acd6e551ec5ffecdcf71b
-
SHA1
3b7d78b3cf06f6b0caa20b7b8ae9dc395548a723
-
SHA256
1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534
-
SHA512
6d1ee393551222413f3f07252ef7201b51047ef4b76dd8cdc74e2477e3be784dd2866d17da2481c79945b9bb9574bf2a4a6a923c43d9cb4432dd6a814cf73c67
-
SSDEEP
6144:HAemIDCLNJHnjIxTjJHfn0lkQGCXtZnALh7pBuc:g6KExT98lRXw7pB
Malware Config
Extracted
trickbot
1000263
lib314
118.97.119.218:449
94.181.47.198:449
144.121.143.129:449
185.200.60.138:449
185.42.52.126:449
181.174.112.74:449
178.116.83.49:443
121.58.242.206:449
182.50.64.148:449
82.222.40.119:449
97.78.222.18:449
67.79.15.106:449
168.167.87.79:443
103.111.53.126:449
182.253.20.66:449
192.188.120.164:443
81.17.86.112:443
95.154.80.154:449
46.149.182.112:449
69.9.232.167:443
94.232.20.113:443
47.49.168.50:443
70.79.178.120:449
68.109.83.22:443
109.199.231.116:443
62.141.94.107:443
96.43.40.221:443
197.232.50.85:443
190.145.74.84:449
185.222.202.127:443
116.212.152.12:449
107.181.174.176:443
23.94.41.215:443
107.173.102.231:443
192.252.209.44:443
107.175.127.147:443
23.226.138.169:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot x86 loader 3 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/780-132-0x00000000006E0000-0x000000000071D000-memory.dmp trickbot_loader32 behavioral2/memory/780-150-0x00000000006E0000-0x000000000071D000-memory.dmp trickbot_loader32 behavioral2/memory/1776-149-0x0000000000720000-0x000000000075D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exepid process 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\mssert\1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe = "C:\\Users\\Admin\\AppData\\Roaming\\mssert\\1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 51 api.ipify.org -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534.exe1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exedescription pid process target process PID 780 wrote to memory of 1776 780 1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534.exe 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe PID 780 wrote to memory of 1776 780 1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534.exe 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe PID 780 wrote to memory of 1776 780 1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534.exe 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe PID 1776 wrote to memory of 2964 1776 1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534.exe"C:\Users\Admin\AppData\Local\Temp\1e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\mssert\1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exeC:\Users\Admin\AppData\Roaming\mssert\1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2386679933-1492765628-3466841596-1000\0f5007522459c86e95ffcc62f32308f1_8329e3af-909b-464f-88cb-23d8b2c5eadfFilesize
1KB
MD59c58924c62eb8cf19c386857da727cc7
SHA14557babab244d99aa5a8a11dece50f963c6db21b
SHA2565d5d5acc75f73519a33151588cf0be03883a195390ac1e8e07e0646186bdb4d1
SHA512dfa408bcf5cea7f1cebd8163094bc98948ea089c890f9774cbdcb610f2619fa0c9c38b03a28d3ed1e3fe7fb5d6408c12bcedb6354f583e55dacfa4c63fa42dcd
-
C:\Users\Admin\AppData\Roaming\mssert\1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exeFilesize
299KB
MD5fa04235f2c1acd6e551ec5ffecdcf71b
SHA13b7d78b3cf06f6b0caa20b7b8ae9dc395548a723
SHA2561e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534
SHA5126d1ee393551222413f3f07252ef7201b51047ef4b76dd8cdc74e2477e3be784dd2866d17da2481c79945b9bb9574bf2a4a6a923c43d9cb4432dd6a814cf73c67
-
C:\Users\Admin\AppData\Roaming\mssert\1e1cd9e03241b216e26e403ad23c6db784188c677ebd99ff776a1ec214f8e634.exeFilesize
299KB
MD5fa04235f2c1acd6e551ec5ffecdcf71b
SHA13b7d78b3cf06f6b0caa20b7b8ae9dc395548a723
SHA2561e1cd8e03241b215e25e403ad23c5db674177c566ebd88ff665a1ec214f7e534
SHA5126d1ee393551222413f3f07252ef7201b51047ef4b76dd8cdc74e2477e3be784dd2866d17da2481c79945b9bb9574bf2a4a6a923c43d9cb4432dd6a814cf73c67
-
memory/780-132-0x00000000006E0000-0x000000000071D000-memory.dmpFilesize
244KB
-
memory/780-150-0x00000000006E0000-0x000000000071D000-memory.dmpFilesize
244KB
-
memory/1776-133-0x0000000000000000-mapping.dmp
-
memory/1776-138-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/1776-149-0x0000000000720000-0x000000000075D000-memory.dmpFilesize
244KB
-
memory/2964-141-0x0000000000000000-mapping.dmp
-
memory/2964-143-0x0000000140000000-0x0000000140035000-memory.dmpFilesize
212KB