Overview
overview
10Static
static
8client/202...st.exe
windows7-x64
10client/202...st.exe
windows10-2004-x64
10client/202...-2.doc
windows7-x64
10client/202...-2.doc
windows10-2004-x64
10client/202...on.exe
windows7-x64
10client/202...on.exe
windows10-2004-x64
10client/202...ro.exe
windows7-x64
10client/202...ro.exe
windows10-2004-x64
10client/gpu...3C.exe
windows7-x64
10client/gpu...3C.exe
windows10-2004-x64
10client/gpu...rt.exe
windows7-x64
10client/gpu...rt.exe
windows10-2004-x64
10dc/gpuheal...rt.exe
windows7-x64
10dc/gpuheal...rt.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2022 19:37
Behavioral task
behavioral1
Sample
client/2020-01-14-Trickbot-gtag-mor75-retrieved-by-Emotet-infected-host.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
client/2020-01-14-Trickbot-gtag-mor75-retrieved-by-Emotet-infected-host.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
client/2020-01-14-Word-doc-with-macro-for-Emotet-epoch-2.doc
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
client/2020-01-14-Word-doc-with-macro-for-Emotet-epoch-2.doc
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
client/2020-01-14-follow-up-Emotet-binary-after-initial-infection.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
client/2020-01-14-follow-up-Emotet-binary-after-initial-infection.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
client/2020-01-14-initial-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
client/2020-01-14-initial-Emotet-binary-retrieved-by-Word-macro.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
client/gpuhealth/GƆCCKX ↀↂ;;;;;;;;;;;;;;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв003423C.exe
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
client/gpuhealth/GƆCCKX ↀↂ;;;;;;;;;;;;;;;;;;;ж;;;;;;;;;;;яЫФЦйвЫФв003423C.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
client/gpuhealth/syrecrt.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
client/gpuhealth/syrecrt.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
dc/gpuhealth/syrecrt.exe
Resource
win7-20221111-en
General
-
Target
dc/gpuhealth/syrecrt.exe
-
Size
636KB
-
MD5
49718c5d4fa5792aad0397190ffbbb49
-
SHA1
9f5c0dd44498575be961e494c53e2de3c27b701a
-
SHA256
2de0320f9a93943e2b0564b760cdbfa13bd90b70cef3c59aadd132c3d24c2de0
-
SHA512
8aec434749b54ca0b9ea80b5d34efa6bc718b7831e6510667fdfbf69e7eabea5dc4ee747bcd2da8b5917489b8f493be22d748e5d16d723793a3727a32066390c
-
SSDEEP
6144:FsD8AG8D0dYIeyIJqteVmdVYk9Lx9WjVLDVElBik2RSRmf/XPXtPiMN7vTBAHn9:WPP0drYqMmdVdpx9qylokuSRmf/XwMtc
Malware Config
Signatures
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral14/memory/4848-135-0x00000000023D0000-0x0000000002401000-memory.dmp trickbot_loader32 behavioral14/memory/4848-136-0x00000000023D0000-0x0000000002401000-memory.dmp trickbot_loader32 behavioral14/memory/4848-138-0x00000000023D0000-0x0000000002401000-memory.dmp trickbot_loader32 behavioral14/memory/1988-147-0x0000000000DE0000-0x0000000000E11000-memory.dmp trickbot_loader32 behavioral14/memory/1988-149-0x0000000000DE0000-0x0000000000E11000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
Processes:
syrccrt.exepid process 1988 syrccrt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 5060 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
syrecrt.exesyrccrt.exepid process 4848 syrecrt.exe 4848 syrecrt.exe 1988 syrccrt.exe 1988 syrccrt.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
syrecrt.exesyrccrt.exedescription pid process target process PID 4848 wrote to memory of 4408 4848 syrecrt.exe svchost.exe PID 4848 wrote to memory of 4408 4848 syrecrt.exe svchost.exe PID 4848 wrote to memory of 4408 4848 syrecrt.exe svchost.exe PID 4848 wrote to memory of 4408 4848 syrecrt.exe svchost.exe PID 1988 wrote to memory of 5060 1988 syrccrt.exe svchost.exe PID 1988 wrote to memory of 5060 1988 syrccrt.exe svchost.exe PID 1988 wrote to memory of 5060 1988 syrccrt.exe svchost.exe PID 1988 wrote to memory of 5060 1988 syrccrt.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc\gpuhealth\syrecrt.exe"C:\Users\Admin\AppData\Local\Temp\dc\gpuhealth\syrecrt.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\gpuhealth\syrccrt.exeC:\Users\Admin\AppData\Roaming\gpuhealth\syrccrt.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\gpuhealth\syrccrt.exeFilesize
636KB
MD549718c5d4fa5792aad0397190ffbbb49
SHA19f5c0dd44498575be961e494c53e2de3c27b701a
SHA2562de0320f9a93943e2b0564b760cdbfa13bd90b70cef3c59aadd132c3d24c2de0
SHA5128aec434749b54ca0b9ea80b5d34efa6bc718b7831e6510667fdfbf69e7eabea5dc4ee747bcd2da8b5917489b8f493be22d748e5d16d723793a3727a32066390c
-
C:\Users\Admin\AppData\Roaming\gpuhealth\syrccrt.exeFilesize
636KB
MD549718c5d4fa5792aad0397190ffbbb49
SHA19f5c0dd44498575be961e494c53e2de3c27b701a
SHA2562de0320f9a93943e2b0564b760cdbfa13bd90b70cef3c59aadd132c3d24c2de0
SHA5128aec434749b54ca0b9ea80b5d34efa6bc718b7831e6510667fdfbf69e7eabea5dc4ee747bcd2da8b5917489b8f493be22d748e5d16d723793a3727a32066390c
-
memory/1988-149-0x0000000000DE0000-0x0000000000E11000-memory.dmpFilesize
196KB
-
memory/1988-147-0x0000000000DE0000-0x0000000000E11000-memory.dmpFilesize
196KB
-
memory/4408-137-0x0000000000000000-mapping.dmp
-
memory/4408-139-0x000002A123F20000-0x000002A123F42000-memory.dmpFilesize
136KB
-
memory/4408-140-0x000002A123F20000-0x000002A123F42000-memory.dmpFilesize
136KB
-
memory/4848-138-0x00000000023D0000-0x0000000002401000-memory.dmpFilesize
196KB
-
memory/4848-135-0x00000000023D0000-0x0000000002401000-memory.dmpFilesize
196KB
-
memory/4848-136-0x00000000023D0000-0x0000000002401000-memory.dmpFilesize
196KB
-
memory/5060-148-0x0000000000000000-mapping.dmp
-
memory/5060-150-0x0000026882E50000-0x0000026882E72000-memory.dmpFilesize
136KB
-
memory/5060-151-0x0000026882E50000-0x0000026882E72000-memory.dmpFilesize
136KB