Overview
overview
10Static
static
8client/202...st.exe
windows7-x64
10client/202...st.exe
windows10-2004-x64
10client/202...-2.doc
windows7-x64
10client/202...-2.doc
windows10-2004-x64
10client/202...on.exe
windows7-x64
10client/202...on.exe
windows10-2004-x64
10client/202...ro.exe
windows7-x64
10client/202...ro.exe
windows10-2004-x64
10client/gpu...3C.exe
windows7-x64
10client/gpu...3C.exe
windows10-2004-x64
10client/gpu...rt.exe
windows7-x64
10client/gpu...rt.exe
windows10-2004-x64
10dc/gpuheal...rt.exe
windows7-x64
10dc/gpuheal...rt.exe
windows10-2004-x64
10Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
20-12-2022 19:37
Behavioral task
behavioral1
Sample
client/2020-01-14-Trickbot-gtag-mor75-retrieved-by-Emotet-infected-host.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
client/2020-01-14-Trickbot-gtag-mor75-retrieved-by-Emotet-infected-host.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
client/2020-01-14-Word-doc-with-macro-for-Emotet-epoch-2.doc
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
client/2020-01-14-Word-doc-with-macro-for-Emotet-epoch-2.doc
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
client/2020-01-14-follow-up-Emotet-binary-after-initial-infection.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
client/2020-01-14-follow-up-Emotet-binary-after-initial-infection.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
client/2020-01-14-initial-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
client/2020-01-14-initial-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
client/gpuhealth/GƆCCKX ↀↂ;;;;;;;;;;;;;;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв003423C.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
client/gpuhealth/GƆCCKX ↀↂ;;;;;;;;;;;;;;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв003423C.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
client/gpuhealth/syrecrt.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
client/gpuhealth/syrecrt.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
dc/gpuhealth/syrecrt.exe
Resource
win7-20221111-en
General
-
Target
dc/gpuhealth/syrecrt.exe
-
Size
636KB
-
MD5
49718c5d4fa5792aad0397190ffbbb49
-
SHA1
9f5c0dd44498575be961e494c53e2de3c27b701a
-
SHA256
2de0320f9a93943e2b0564b760cdbfa13bd90b70cef3c59aadd132c3d24c2de0
-
SHA512
8aec434749b54ca0b9ea80b5d34efa6bc718b7831e6510667fdfbf69e7eabea5dc4ee747bcd2da8b5917489b8f493be22d748e5d16d723793a3727a32066390c
-
SSDEEP
6144:FsD8AG8D0dYIeyIJqteVmdVYk9Lx9WjVLDVElBik2RSRmf/XPXtPiMN7vTBAHn9:WPP0drYqMmdVdpx9qylokuSRmf/XwMtc
Malware Config
Signatures
-
Trickbot x86 loader 3 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral13/memory/2008-57-0x00000000003B0000-0x00000000003E1000-memory.dmp trickbot_loader32 behavioral13/memory/2008-59-0x00000000003B0000-0x00000000003E1000-memory.dmp trickbot_loader32 behavioral13/memory/2008-61-0x00000000003B0000-0x00000000003E1000-memory.dmp trickbot_loader32 -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
syrecrt.exepid process 2008 syrecrt.exe 2008 syrecrt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
syrecrt.exedescription pid process target process PID 2008 wrote to memory of 1952 2008 syrecrt.exe svchost.exe PID 2008 wrote to memory of 1952 2008 syrecrt.exe svchost.exe PID 2008 wrote to memory of 1952 2008 syrecrt.exe svchost.exe PID 2008 wrote to memory of 1952 2008 syrecrt.exe svchost.exe PID 2008 wrote to memory of 1952 2008 syrecrt.exe svchost.exe PID 2008 wrote to memory of 1952 2008 syrecrt.exe svchost.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1952-60-0x0000000000000000-mapping.dmp
-
memory/1952-62-0x0000000000060000-0x0000000000082000-memory.dmpFilesize
136KB
-
memory/2008-57-0x00000000003B0000-0x00000000003E1000-memory.dmpFilesize
196KB
-
memory/2008-58-0x0000000076931000-0x0000000076933000-memory.dmpFilesize
8KB
-
memory/2008-59-0x00000000003B0000-0x00000000003E1000-memory.dmpFilesize
196KB
-
memory/2008-61-0x00000000003B0000-0x00000000003E1000-memory.dmpFilesize
196KB