Analysis
-
max time kernel
150s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
28/12/2022, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
zmoperes.ri.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
zmoperes.ri.exe
Resource
win7-20220812-en
Behavioral task
behavioral3
Sample
zmoperes.ri.exe
Resource
win10v2004-20220901-en
General
-
Target
zmoperes.ri.exe
-
Size
313KB
-
MD5
104b457b6d90fc80ff2dbbcebbb7ca8b
-
SHA1
7842611837af04d7c986de21ab2454ed397014de
-
SHA256
1c81272ffc28b29a82d8313bd74d1c6030c2af1ba4b165c44dc8ea6376679d9f
-
SHA512
504b6d45d0dbafadbefbc30d137ecf399a79bbfefe11418e5defec4f9b6ee66d170ecc12c5e9bd76511403d357d071e71d56f57e2587e558c3a91b3a0ef21df0
-
SSDEEP
6144:cqzfvclHbmBwuKj6BkT4GvEH5sLLJ6vd4p:cqzHWHbmQGBkT46689I
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2124-152-0x0000000010000000-0x0000000010040000-memory.dmp trickbot_loader32 behavioral1/memory/1688-165-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral1/memory/1688-233-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral1/memory/4868-681-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 1944 zmopeset.ri.exe 4868 zmopeset.ri.exe -
Stops running service(s) 3 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\msnet\zmopeset.ri.exe = "C:\\Users\\Admin\\AppData\\Roaming\\msnet\\zmopeset.ri.exe" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2124 set thread context of 1688 2124 zmoperes.ri.exe 66 PID 1944 set thread context of 4868 1944 zmopeset.ri.exe 77 -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 780 sc.exe 700 sc.exe 4876 sc.exe 2844 sc.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1688 zmoperes.ri.exe 1688 zmoperes.ri.exe 1688 zmoperes.ri.exe 1688 zmoperes.ri.exe 1688 zmoperes.ri.exe 1688 zmoperes.ri.exe 4296 powershell.exe 4296 powershell.exe 4296 powershell.exe 4868 zmopeset.ri.exe 4868 zmopeset.ri.exe 4868 zmopeset.ri.exe 4868 zmopeset.ri.exe 4868 zmopeset.ri.exe 4868 zmopeset.ri.exe 4500 powershell.exe 4500 powershell.exe 4500 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2124 zmoperes.ri.exe 1944 zmopeset.ri.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4296 powershell.exe Token: SeDebugPrivilege 4500 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1688 2124 zmoperes.ri.exe 66 PID 2124 wrote to memory of 1688 2124 zmoperes.ri.exe 66 PID 2124 wrote to memory of 1688 2124 zmoperes.ri.exe 66 PID 2124 wrote to memory of 1688 2124 zmoperes.ri.exe 66 PID 1688 wrote to memory of 1436 1688 zmoperes.ri.exe 67 PID 1688 wrote to memory of 1436 1688 zmoperes.ri.exe 67 PID 1688 wrote to memory of 1436 1688 zmoperes.ri.exe 67 PID 1688 wrote to memory of 2844 1688 zmoperes.ri.exe 68 PID 1688 wrote to memory of 2844 1688 zmoperes.ri.exe 68 PID 1688 wrote to memory of 2844 1688 zmoperes.ri.exe 68 PID 1688 wrote to memory of 2104 1688 zmoperes.ri.exe 69 PID 1688 wrote to memory of 2104 1688 zmoperes.ri.exe 69 PID 1688 wrote to memory of 2104 1688 zmoperes.ri.exe 69 PID 1688 wrote to memory of 1944 1688 zmoperes.ri.exe 70 PID 1688 wrote to memory of 1944 1688 zmoperes.ri.exe 70 PID 1688 wrote to memory of 1944 1688 zmoperes.ri.exe 70 PID 2844 wrote to memory of 780 2844 cmd.exe 74 PID 1436 wrote to memory of 700 1436 cmd.exe 75 PID 2844 wrote to memory of 780 2844 cmd.exe 74 PID 2844 wrote to memory of 780 2844 cmd.exe 74 PID 1436 wrote to memory of 700 1436 cmd.exe 75 PID 1436 wrote to memory of 700 1436 cmd.exe 75 PID 2104 wrote to memory of 4296 2104 cmd.exe 76 PID 2104 wrote to memory of 4296 2104 cmd.exe 76 PID 2104 wrote to memory of 4296 2104 cmd.exe 76 PID 1944 wrote to memory of 4868 1944 zmopeset.ri.exe 77 PID 1944 wrote to memory of 4868 1944 zmopeset.ri.exe 77 PID 1944 wrote to memory of 4868 1944 zmopeset.ri.exe 77 PID 1944 wrote to memory of 4868 1944 zmopeset.ri.exe 77 PID 4868 wrote to memory of 512 4868 zmopeset.ri.exe 78 PID 4868 wrote to memory of 512 4868 zmopeset.ri.exe 78 PID 4868 wrote to memory of 512 4868 zmopeset.ri.exe 78 PID 4868 wrote to memory of 4320 4868 zmopeset.ri.exe 79 PID 4868 wrote to memory of 4320 4868 zmopeset.ri.exe 79 PID 4868 wrote to memory of 4320 4868 zmopeset.ri.exe 79 PID 4868 wrote to memory of 4312 4868 zmopeset.ri.exe 80 PID 4868 wrote to memory of 4312 4868 zmopeset.ri.exe 80 PID 4868 wrote to memory of 4312 4868 zmopeset.ri.exe 80 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82 PID 4868 wrote to memory of 3180 4868 zmopeset.ri.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\zmoperes.ri.exe"C:\Users\Admin\AppData\Local\Temp\zmoperes.ri.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\zmoperes.ri.exe"C:\Users\Admin\AppData\Local\Temp\zmoperes.ri.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\sc.exesc stop WinDefend4⤵
- Launches sc.exe
PID:700
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend3⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\sc.exesc delete WinDefend4⤵
- Launches sc.exe
PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
-
C:\Users\Admin\AppData\Roaming\msnet\zmopeset.ri.exeC:\Users\Admin\AppData\Roaming\msnet\zmopeset.ri.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\msnet\zmopeset.ri.exeC:\Users\Admin\AppData\Roaming\msnet\zmopeset.ri.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\cmd.exe/c sc stop WinDefend5⤵PID:512
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend6⤵
- Launches sc.exe
PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.exe/c sc delete WinDefend5⤵PID:4320
-
C:\Windows\SysWOW64\sc.exesc delete WinDefend6⤵
- Launches sc.exe
PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exe/c powershell Set-MpPreference -DisableRealtimeMonitoring $true5⤵PID:4312
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe5⤵
- Adds Run key to start application
PID:3180
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5b1a1b2a1a37f587aed4e1ec001849c32
SHA1d3b87a74154bb7046645ba5acb770728b6288f8a
SHA2567a40549515c0b9c48fa03a3c9c525b4a1b1b4fa036a21b3e966801cfb230de63
SHA512e80f9023281b3e6ca6f6c21d39e712f728e4e27ef833f04772dca538336921c324497d9241ccff76ca85f26f4f33f2a54fd53d36cbaef42657fdc8eac26df2c5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2482096546-1136599444-1359412500-1000\0f5007522459c86e95ffcc62f32308f1_1adb157e-7186-4895-9c9e-46386703fc96
Filesize1KB
MD5987e3e95af5efbd34305bdf08753aa87
SHA14e893b1e1144a464edc6db6de749780c6522b7c2
SHA256500bfdf947e9e188dcbfd1e04c710cc59ae0bf70f2d4e68e270dbe4bfe2b0936
SHA512777387d6711565ef6230702bb69d7958d1de45e78fc729e4d4b5d52851ebb61899424e10ffeef38232a1bed305b29da441a381b24cfe57c69bdde61cbaa46907
-
Filesize
313KB
MD5104b457b6d90fc80ff2dbbcebbb7ca8b
SHA17842611837af04d7c986de21ab2454ed397014de
SHA2561c81272ffc28b29a82d8313bd74d1c6030c2af1ba4b165c44dc8ea6376679d9f
SHA512504b6d45d0dbafadbefbc30d137ecf399a79bbfefe11418e5defec4f9b6ee66d170ecc12c5e9bd76511403d357d071e71d56f57e2587e558c3a91b3a0ef21df0
-
Filesize
313KB
MD5104b457b6d90fc80ff2dbbcebbb7ca8b
SHA17842611837af04d7c986de21ab2454ed397014de
SHA2561c81272ffc28b29a82d8313bd74d1c6030c2af1ba4b165c44dc8ea6376679d9f
SHA512504b6d45d0dbafadbefbc30d137ecf399a79bbfefe11418e5defec4f9b6ee66d170ecc12c5e9bd76511403d357d071e71d56f57e2587e558c3a91b3a0ef21df0
-
Filesize
313KB
MD5104b457b6d90fc80ff2dbbcebbb7ca8b
SHA17842611837af04d7c986de21ab2454ed397014de
SHA2561c81272ffc28b29a82d8313bd74d1c6030c2af1ba4b165c44dc8ea6376679d9f
SHA512504b6d45d0dbafadbefbc30d137ecf399a79bbfefe11418e5defec4f9b6ee66d170ecc12c5e9bd76511403d357d071e71d56f57e2587e558c3a91b3a0ef21df0