Overview
overview
10Static
static
8client/202...st.exe
windows7-x64
10client/202...st.exe
windows10-2004-x64
10client/202...-2.doc
windows7-x64
10client/202...-2.doc
windows10-2004-x64
10client/202...on.exe
windows7-x64
10client/202...on.exe
windows10-2004-x64
10client/202...ro.exe
windows7-x64
10client/202...ro.exe
windows10-2004-x64
10client/gpu...3C.exe
windows7-x64
10client/gpu...3C.exe
windows10-2004-x64
10client/gpu...rt.exe
windows7-x64
10client/gpu...rt.exe
windows10-2004-x64
10dc/gpuheal...rt.exe
windows7-x64
10dc/gpuheal...rt.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2022 19:37
Behavioral task
behavioral1
Sample
client/2020-01-14-Trickbot-gtag-mor75-retrieved-by-Emotet-infected-host.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
client/2020-01-14-Trickbot-gtag-mor75-retrieved-by-Emotet-infected-host.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
client/2020-01-14-Word-doc-with-macro-for-Emotet-epoch-2.doc
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
client/2020-01-14-Word-doc-with-macro-for-Emotet-epoch-2.doc
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
client/2020-01-14-follow-up-Emotet-binary-after-initial-infection.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
client/2020-01-14-follow-up-Emotet-binary-after-initial-infection.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
client/2020-01-14-initial-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
client/2020-01-14-initial-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
client/gpuhealth/GƆCCKX ↀↂ;;;;;;;;;;;;;;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв003423C.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
client/gpuhealth/GƆCCKX ↀↂ;;;;;;;;;;;;;;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв003423C.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
client/gpuhealth/syrecrt.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
client/gpuhealth/syrecrt.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
dc/gpuhealth/syrecrt.exe
Resource
win7-20221111-en
General
-
Target
client/gpuhealth/syrecrt.exe
-
Size
636KB
-
MD5
b1ee1b5bcf9081a4556c9eca8ddee08b
-
SHA1
44ce0ffaa7e00619041d5c6a55b333cd68b34e9f
-
SHA256
7f35814a168b322a70dde6653134deed0771ae69860e1dcb3b464237c327357b
-
SHA512
cd56bbc7039cdba69ba475a9011511425cbe63d3ba6f59aa569c8a96089ee0df0a54b0b789be43d4d1af66c1b21d3d1c191240a40dc3692f39eebbd3be6a4a56
-
SSDEEP
6144:FsD8AG8s0dYIeyIJqteVmdVYk9Lx9WjVLDVElBik2RSRmf/XPXtPiMN7vTBAHn9:WP40drYqMmdVdpx9qylokuSRmf/XwMtc
Malware Config
Signatures
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral12/memory/764-135-0x00000000022B0000-0x00000000022E1000-memory.dmp trickbot_loader32 behavioral12/memory/764-136-0x00000000022B0000-0x00000000022E1000-memory.dmp trickbot_loader32 behavioral12/memory/764-138-0x00000000022B0000-0x00000000022E1000-memory.dmp trickbot_loader32 behavioral12/memory/4068-147-0x0000000000E30000-0x0000000000E61000-memory.dmp trickbot_loader32 behavioral12/memory/4068-149-0x0000000000E30000-0x0000000000E61000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
syrccrt.exepid process 4068 syrccrt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 4052 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
syrecrt.exesyrccrt.exepid process 764 syrecrt.exe 764 syrecrt.exe 4068 syrccrt.exe 4068 syrccrt.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
syrecrt.exesyrccrt.exedescription pid process target process PID 764 wrote to memory of 2200 764 syrecrt.exe svchost.exe PID 764 wrote to memory of 2200 764 syrecrt.exe svchost.exe PID 764 wrote to memory of 2200 764 syrecrt.exe svchost.exe PID 764 wrote to memory of 2200 764 syrecrt.exe svchost.exe PID 4068 wrote to memory of 4052 4068 syrccrt.exe svchost.exe PID 4068 wrote to memory of 4052 4068 syrccrt.exe svchost.exe PID 4068 wrote to memory of 4052 4068 syrccrt.exe svchost.exe PID 4068 wrote to memory of 4052 4068 syrccrt.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\client\gpuhealth\syrecrt.exe"C:\Users\Admin\AppData\Local\Temp\client\gpuhealth\syrecrt.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\gpuhealth\syrccrt.exeC:\Users\Admin\AppData\Roaming\gpuhealth\syrccrt.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\gpuhealth\syrccrt.exeFilesize
636KB
MD5b1ee1b5bcf9081a4556c9eca8ddee08b
SHA144ce0ffaa7e00619041d5c6a55b333cd68b34e9f
SHA2567f35814a168b322a70dde6653134deed0771ae69860e1dcb3b464237c327357b
SHA512cd56bbc7039cdba69ba475a9011511425cbe63d3ba6f59aa569c8a96089ee0df0a54b0b789be43d4d1af66c1b21d3d1c191240a40dc3692f39eebbd3be6a4a56
-
C:\Users\Admin\AppData\Roaming\gpuhealth\syrccrt.exeFilesize
636KB
MD5b1ee1b5bcf9081a4556c9eca8ddee08b
SHA144ce0ffaa7e00619041d5c6a55b333cd68b34e9f
SHA2567f35814a168b322a70dde6653134deed0771ae69860e1dcb3b464237c327357b
SHA512cd56bbc7039cdba69ba475a9011511425cbe63d3ba6f59aa569c8a96089ee0df0a54b0b789be43d4d1af66c1b21d3d1c191240a40dc3692f39eebbd3be6a4a56
-
memory/764-138-0x00000000022B0000-0x00000000022E1000-memory.dmpFilesize
196KB
-
memory/764-135-0x00000000022B0000-0x00000000022E1000-memory.dmpFilesize
196KB
-
memory/764-136-0x00000000022B0000-0x00000000022E1000-memory.dmpFilesize
196KB
-
memory/2200-139-0x000002B8E67D0000-0x000002B8E67F2000-memory.dmpFilesize
136KB
-
memory/2200-140-0x000002B8E67D0000-0x000002B8E67F2000-memory.dmpFilesize
136KB
-
memory/2200-137-0x0000000000000000-mapping.dmp
-
memory/4052-148-0x0000000000000000-mapping.dmp
-
memory/4052-150-0x00000241A8EB0000-0x00000241A8ED2000-memory.dmpFilesize
136KB
-
memory/4052-151-0x00000241A8EB0000-0x00000241A8ED2000-memory.dmpFilesize
136KB
-
memory/4068-147-0x0000000000E30000-0x0000000000E61000-memory.dmpFilesize
196KB
-
memory/4068-149-0x0000000000E30000-0x0000000000E61000-memory.dmpFilesize
196KB