Resubmissions
29-01-2023 17:44
230129-wbbqdshc5z 10Analysis
-
max time kernel
126s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 17:44
Static task
static1
Behavioral task
behavioral1
Sample
732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7.exe
Resource
win7-20220812-en
General
-
Target
732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7.exe
-
Size
329KB
-
MD5
27837c212d654407b893ca689aa71ed4
-
SHA1
ac0ec08c5a132c39a15626bf1f638ee6b545302e
-
SHA256
732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7
-
SHA512
ed9601b607fe93ee26e1b4851a420ca5dc7687092199196b349e8ffcfdbfeae30d5762cd63612120620deb83ae92648a95f08e48257620d2787d40f1f772e559
-
SSDEEP
6144:6HBGzzdFCJx6fVyYlrXKkKQU5dr/pseozXgWRZB0sP/vUg:D3zZ8YNKaU5NBsemQWTBN
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/2808-132-0x0000000000730000-0x000000000075B000-memory.dmp trickbot_loader32 behavioral2/memory/2808-137-0x0000000000730000-0x000000000075B000-memory.dmp trickbot_loader32 behavioral2/memory/1792-138-0x00000000001A0000-0x00000000001CB000-memory.dmp trickbot_loader32 behavioral2/memory/1792-149-0x00000000001A0000-0x00000000001CB000-memory.dmp trickbot_loader32 behavioral2/memory/4192-151-0x0000000000F60000-0x0000000000F8B000-memory.dmp trickbot_loader32 behavioral2/memory/4192-162-0x0000000000F60000-0x0000000000F8B000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exepid process 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 43 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exedescription pid process Token: SeTcbPrivilege 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7.exe832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exedescription pid process target process PID 2808 wrote to memory of 1792 2808 732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7.exe 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe PID 2808 wrote to memory of 1792 2808 732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7.exe 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe PID 2808 wrote to memory of 1792 2808 732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7.exe 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 1792 wrote to memory of 4856 1792 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe PID 4192 wrote to memory of 3272 4192 832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7.exe"C:\Users\Admin\AppData\Local\Temp\732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\appnet\832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exeC:\Users\Admin\AppData\Roaming\appnet\832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\appnet\832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exeC:\Users\Admin\AppData\Roaming\appnet\832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-929662420-1054238289-2961194603-1000\0f5007522459c86e95ffcc62f32308f1_4cfb5922-b036-4c14-9ed1-03c0dad19fbdFilesize
1KB
MD5bf886d73a40cdf24bead549d0d044c71
SHA14a35bf96870b6f5f6a0398b3d0eb19f4941f02ff
SHA256a2755bc5666416f2609de458a107ae0a503451906d2b179b9a360871daf8f1f5
SHA51243896d530530d30107789b56d490a092b6135f823ca3f652d382e7040a87893ffa579b34d4e703d274a655342e4752af771d2e92ce62a209ff37c903dc99f3b4
-
C:\Users\Admin\AppData\Roaming\appnet\832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exeFilesize
329KB
MD527837c212d654407b893ca689aa71ed4
SHA1ac0ec08c5a132c39a15626bf1f638ee6b545302e
SHA256732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7
SHA512ed9601b607fe93ee26e1b4851a420ca5dc7687092199196b349e8ffcfdbfeae30d5762cd63612120620deb83ae92648a95f08e48257620d2787d40f1f772e559
-
C:\Users\Admin\AppData\Roaming\appnet\832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exeFilesize
329KB
MD527837c212d654407b893ca689aa71ed4
SHA1ac0ec08c5a132c39a15626bf1f638ee6b545302e
SHA256732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7
SHA512ed9601b607fe93ee26e1b4851a420ca5dc7687092199196b349e8ffcfdbfeae30d5762cd63612120620deb83ae92648a95f08e48257620d2787d40f1f772e559
-
C:\Users\Admin\AppData\Roaming\appnet\832a799e719a0f866e0da9303136aa3370dca3099e113a869f9fa7606b8806c8.exeFilesize
329KB
MD527837c212d654407b893ca689aa71ed4
SHA1ac0ec08c5a132c39a15626bf1f638ee6b545302e
SHA256732a688e619a0f755e0da9303135aa3360dca3098e113a758f8fa6505b7705c7
SHA512ed9601b607fe93ee26e1b4851a420ca5dc7687092199196b349e8ffcfdbfeae30d5762cd63612120620deb83ae92648a95f08e48257620d2787d40f1f772e559
-
memory/1792-138-0x00000000001A0000-0x00000000001CB000-memory.dmpFilesize
172KB
-
memory/1792-140-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/1792-149-0x00000000001A0000-0x00000000001CB000-memory.dmpFilesize
172KB
-
memory/1792-133-0x0000000000000000-mapping.dmp
-
memory/2808-137-0x0000000000730000-0x000000000075B000-memory.dmpFilesize
172KB
-
memory/2808-132-0x0000000000730000-0x000000000075B000-memory.dmpFilesize
172KB
-
memory/3272-156-0x0000000000000000-mapping.dmp
-
memory/4192-151-0x0000000000F60000-0x0000000000F8B000-memory.dmpFilesize
172KB
-
memory/4192-162-0x0000000000F60000-0x0000000000F8B000-memory.dmpFilesize
172KB
-
memory/4856-143-0x0000000000000000-mapping.dmp
-
memory/4856-145-0x0000000010000000-0x0000000010020000-memory.dmpFilesize
128KB