Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 17:44
Static task
static1
Behavioral task
behavioral1
Sample
332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af.exe
Resource
win7-20220901-en
General
-
Target
332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af.exe
-
Size
456KB
-
MD5
92a1c42ec74509a9adbf7fc75b883744
-
SHA1
503be973393e658c26398129787a76f1be78ed9d
-
SHA256
332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af
-
SHA512
e9b25c38d90423be639bd321330ff9115b1a9de2c5d276b487a9b7ed52aecd70ca7f0889ceb9ba9906b389caffff147231daf5010c919f99b9b71aa63bfa80f2
-
SSDEEP
6144:B0NHLXu06G10lVMuofe6FC5T+9GvoiOMhV1v5iulsUUg0GyRo/vAGhwd/K6786TQ:mFLXuhXVMuTVT+IQiO0V5blsJGyCMbGf
Malware Config
Signatures
-
Trickbot x86 loader 11 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4972-133-0x00000000007E0000-0x000000000080B000-memory.dmp trickbot_loader32 behavioral2/memory/5032-138-0x0000000000400000-0x0000000000469000-memory.dmp trickbot_loader32 behavioral2/memory/5032-139-0x00000000006E0000-0x000000000070B000-memory.dmp trickbot_loader32 behavioral2/memory/4972-140-0x0000000000400000-0x0000000000469000-memory.dmp trickbot_loader32 behavioral2/memory/4972-141-0x00000000007E0000-0x000000000080B000-memory.dmp trickbot_loader32 behavioral2/memory/5032-152-0x0000000000400000-0x0000000000469000-memory.dmp trickbot_loader32 behavioral2/memory/5032-153-0x00000000006E0000-0x000000000070B000-memory.dmp trickbot_loader32 behavioral2/memory/4048-155-0x0000000000400000-0x0000000000469000-memory.dmp trickbot_loader32 behavioral2/memory/4048-156-0x00000000001C0000-0x00000000001EB000-memory.dmp trickbot_loader32 behavioral2/memory/4048-167-0x0000000000400000-0x0000000000469000-memory.dmp trickbot_loader32 behavioral2/memory/4048-168-0x00000000001C0000-0x00000000001EB000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exepid process 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 40 wtfismyip.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exedescription pid process Token: SeTcbPrivilege 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af.exe332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exedescription pid process target process PID 4972 wrote to memory of 5032 4972 332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af.exe 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe PID 4972 wrote to memory of 5032 4972 332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af.exe 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe PID 4972 wrote to memory of 5032 4972 332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af.exe 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 5032 wrote to memory of 1668 5032 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe PID 4048 wrote to memory of 2432 4048 332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af.exe"C:\Users\Admin\AppData\Local\Temp\332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\wnetwork\332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exeC:\Users\Admin\AppData\Roaming\wnetwork\332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\wnetwork\332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exeC:\Users\Admin\AppData\Roaming\wnetwork\332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2891029575-1462575-1165213807-1000\0f5007522459c86e95ffcc62f32308f1_9be0bf4d-f8db-4af4-be85-dc38433c9501Filesize
1KB
MD5363a6ec4503251a37b97b5a232f4bfc5
SHA1c2fde1648b6129f2715437fa3805ba9b0c0d17b0
SHA25685a784f0fcb2b25e7a7970f35732da1bdad59227c6604c41294531e1068eb7e4
SHA5127c83aeaedc155d37b6d2c488c419c6a056ea54b98e7d16d0f3a338f61f59c94cb8c98dc3b51cb938eb0b527e47dcb03859d1bf1bdf68adf41d37057529dcb98c
-
C:\Users\Admin\AppData\Roaming\wnetwork\332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exeFilesize
456KB
MD592a1c42ec74509a9adbf7fc75b883744
SHA1503be973393e658c26398129787a76f1be78ed9d
SHA256332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af
SHA512e9b25c38d90423be639bd321330ff9115b1a9de2c5d276b487a9b7ed52aecd70ca7f0889ceb9ba9906b389caffff147231daf5010c919f99b9b71aa63bfa80f2
-
C:\Users\Admin\AppData\Roaming\wnetwork\332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exeFilesize
456KB
MD592a1c42ec74509a9adbf7fc75b883744
SHA1503be973393e658c26398129787a76f1be78ed9d
SHA256332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af
SHA512e9b25c38d90423be639bd321330ff9115b1a9de2c5d276b487a9b7ed52aecd70ca7f0889ceb9ba9906b389caffff147231daf5010c919f99b9b71aa63bfa80f2
-
C:\Users\Admin\AppData\Roaming\wnetwork\332f89bcb0db2d1559dc2bb1d9396abcf36758f13fa7370353fc98b9d893a1af.exeFilesize
456KB
MD592a1c42ec74509a9adbf7fc75b883744
SHA1503be973393e658c26398129787a76f1be78ed9d
SHA256332f79bcb0db2d1448dc2bb1d9385abcf35647f13fa6360343fc87b9d793a1af
SHA512e9b25c38d90423be639bd321330ff9115b1a9de2c5d276b487a9b7ed52aecd70ca7f0889ceb9ba9906b389caffff147231daf5010c919f99b9b71aa63bfa80f2
-
memory/1668-146-0x0000000000000000-mapping.dmp
-
memory/1668-148-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB
-
memory/2432-161-0x0000000000000000-mapping.dmp
-
memory/4048-155-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/4048-168-0x00000000001C0000-0x00000000001EB000-memory.dmpFilesize
172KB
-
memory/4048-167-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/4048-156-0x00000000001C0000-0x00000000001EB000-memory.dmpFilesize
172KB
-
memory/4972-132-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/4972-141-0x00000000007E0000-0x000000000080B000-memory.dmpFilesize
172KB
-
memory/4972-140-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/4972-133-0x00000000007E0000-0x000000000080B000-memory.dmpFilesize
172KB
-
memory/5032-139-0x00000000006E0000-0x000000000070B000-memory.dmpFilesize
172KB
-
memory/5032-134-0x0000000000000000-mapping.dmp
-
memory/5032-153-0x00000000006E0000-0x000000000070B000-memory.dmpFilesize
172KB
-
memory/5032-152-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/5032-138-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/5032-143-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB