Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2023 20:53
Static task
static1
Behavioral task
behavioral1
Sample
dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe
Resource
win7-20220812-en
General
-
Target
dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe
-
Size
484KB
-
MD5
545bfdc9b1976ae0003443ff4f90eb7e
-
SHA1
92e8ce006bb3c4a1ddb8d8ba8de3a90c0bbb6326
-
SHA256
dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740
-
SHA512
d932842447cdbfdc439908cd3885c321a62565d6941ec1fc0bbc9b9af40bccd6285c982447dc2b36d6c6fb8b8955c4dc19dc4eac3cd691113203e190e926676f
-
SSDEEP
6144:zk0Ip3PNVUaXMR7knvo62EYuWHWOQyojEHkXS6vhGQf9135F8u:z03PNVMooKHWHWnyojM6v1tEu
Malware Config
Signatures
-
Trickbot x86 loader 10 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4588-132-0x0000000002330000-0x0000000002364000-memory.dmp trickbot_loader32 behavioral2/memory/4588-136-0x00000000022C0000-0x00000000022F1000-memory.dmp trickbot_loader32 behavioral2/memory/1304-140-0x0000000000A20000-0x0000000000A54000-memory.dmp trickbot_loader32 behavioral2/memory/1304-144-0x0000000002330000-0x0000000002361000-memory.dmp trickbot_loader32 behavioral2/memory/1304-145-0x0000000000A60000-0x0000000000A90000-memory.dmp trickbot_loader32 behavioral2/memory/1304-146-0x0000000002331000-0x0000000002361000-memory.dmp trickbot_loader32 behavioral2/memory/1304-148-0x0000000002331000-0x0000000002361000-memory.dmp trickbot_loader32 behavioral2/memory/484-154-0x0000000000E40000-0x0000000000E74000-memory.dmp trickbot_loader32 behavioral2/memory/484-159-0x0000000000EE1000-0x0000000000F11000-memory.dmp trickbot_loader32 behavioral2/memory/484-161-0x0000000000EE1000-0x0000000000F11000-memory.dmp trickbot_loader32 -
Dave packer 4 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/4588-132-0x0000000002330000-0x0000000002364000-memory.dmp dave behavioral2/memory/4588-136-0x00000000022C0000-0x00000000022F1000-memory.dmp dave behavioral2/memory/1304-140-0x0000000000A20000-0x0000000000A54000-memory.dmp dave behavioral2/memory/484-154-0x0000000000E40000-0x0000000000E74000-memory.dmp dave -
Executes dropped EXE 2 IoCs
Processes:
ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exeԳայլըсԳայլըПФрКЕыԳայլըааЫ.exepid process 1304 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe 484 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 5048 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exeԳայլըсԳայլըПФрКЕыԳայլըааЫ.exeԳայլըсԳայլըПФрКЕыԳայլըааЫ.exepid process 4588 dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe 4588 dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe 1304 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe 1304 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe 484 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe 484 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exeԳայլըсԳայլըПФрКЕыԳայլըааЫ.exeԳայլըсԳայլըПФрКЕыԳայլըааЫ.exedescription pid process target process PID 4588 wrote to memory of 1304 4588 dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe PID 4588 wrote to memory of 1304 4588 dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe PID 4588 wrote to memory of 1304 4588 dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe PID 1304 wrote to memory of 3316 1304 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe svchost.exe PID 1304 wrote to memory of 3316 1304 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe svchost.exe PID 1304 wrote to memory of 3316 1304 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe svchost.exe PID 1304 wrote to memory of 3316 1304 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe svchost.exe PID 484 wrote to memory of 5048 484 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe svchost.exe PID 484 wrote to memory of 5048 484 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe svchost.exe PID 484 wrote to memory of 5048 484 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe svchost.exe PID 484 wrote to memory of 5048 484 ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe"C:\Users\Admin\AppData\Local\Temp\dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe"C:\ProgramData\ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\windirect\ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exeC:\Users\Admin\AppData\Roaming\windirect\ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exeFilesize
484KB
MD5545bfdc9b1976ae0003443ff4f90eb7e
SHA192e8ce006bb3c4a1ddb8d8ba8de3a90c0bbb6326
SHA256dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740
SHA512d932842447cdbfdc439908cd3885c321a62565d6941ec1fc0bbc9b9af40bccd6285c982447dc2b36d6c6fb8b8955c4dc19dc4eac3cd691113203e190e926676f
-
C:\ProgramData\ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exeFilesize
484KB
MD5545bfdc9b1976ae0003443ff4f90eb7e
SHA192e8ce006bb3c4a1ddb8d8ba8de3a90c0bbb6326
SHA256dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740
SHA512d932842447cdbfdc439908cd3885c321a62565d6941ec1fc0bbc9b9af40bccd6285c982447dc2b36d6c6fb8b8955c4dc19dc4eac3cd691113203e190e926676f
-
C:\Users\Admin\AppData\Roaming\windirect\ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exeFilesize
484KB
MD5545bfdc9b1976ae0003443ff4f90eb7e
SHA192e8ce006bb3c4a1ddb8d8ba8de3a90c0bbb6326
SHA256dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740
SHA512d932842447cdbfdc439908cd3885c321a62565d6941ec1fc0bbc9b9af40bccd6285c982447dc2b36d6c6fb8b8955c4dc19dc4eac3cd691113203e190e926676f
-
C:\Users\Admin\AppData\Roaming\windirect\ԳայլըсԳայլըПФрКЕыԳայլըааЫ.exeFilesize
484KB
MD5545bfdc9b1976ae0003443ff4f90eb7e
SHA192e8ce006bb3c4a1ddb8d8ba8de3a90c0bbb6326
SHA256dd20506b3c65472d58ccc0a018cb67c65fab6718023fd4b16e148e64e69e5740
SHA512d932842447cdbfdc439908cd3885c321a62565d6941ec1fc0bbc9b9af40bccd6285c982447dc2b36d6c6fb8b8955c4dc19dc4eac3cd691113203e190e926676f
-
memory/484-161-0x0000000000EE1000-0x0000000000F11000-memory.dmpFilesize
192KB
-
memory/484-159-0x0000000000EE1000-0x0000000000F11000-memory.dmpFilesize
192KB
-
memory/484-154-0x0000000000E40000-0x0000000000E74000-memory.dmpFilesize
208KB
-
memory/1304-140-0x0000000000A20000-0x0000000000A54000-memory.dmpFilesize
208KB
-
memory/1304-145-0x0000000000A60000-0x0000000000A90000-memory.dmpFilesize
192KB
-
memory/1304-137-0x0000000000000000-mapping.dmp
-
memory/1304-148-0x0000000002331000-0x0000000002361000-memory.dmpFilesize
192KB
-
memory/1304-149-0x0000000010001000-0x0000000010005000-memory.dmpFilesize
16KB
-
memory/1304-144-0x0000000002330000-0x0000000002361000-memory.dmpFilesize
196KB
-
memory/1304-146-0x0000000002331000-0x0000000002361000-memory.dmpFilesize
192KB
-
memory/3316-151-0x000002A1BF480000-0x000002A1BF4A2000-memory.dmpFilesize
136KB
-
memory/3316-150-0x000002A1BF480000-0x000002A1BF4A2000-memory.dmpFilesize
136KB
-
memory/3316-147-0x0000000000000000-mapping.dmp
-
memory/4588-132-0x0000000002330000-0x0000000002364000-memory.dmpFilesize
208KB
-
memory/4588-136-0x00000000022C0000-0x00000000022F1000-memory.dmpFilesize
196KB
-
memory/5048-160-0x0000000000000000-mapping.dmp
-
memory/5048-162-0x00000190DADE0000-0x00000190DAE02000-memory.dmpFilesize
136KB
-
memory/5048-163-0x00000190DADE0000-0x00000190DAE02000-memory.dmpFilesize
136KB