Analysis
-
max time kernel
116s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-03-2023 15:50
Static task
static1
Behavioral task
behavioral1
Sample
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe
Resource
win7-20230220-en
General
-
Target
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe
-
Size
663KB
-
MD5
367b6a5c0e0e8ec68ea14a085b1d32b3
-
SHA1
d02f452d01660387fd78d40e9f2405c3e38c9668
-
SHA256
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
-
SHA512
6e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
SSDEEP
12288:nO4BydKj3ACZfNFEnw6qJxs3UPwgDrZiI0OSnnox7Yu:OOyO3YnwFRPVXZf09nMD
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral1/memory/1440-65-0x00000000002C0000-0x00000000002ED000-memory.dmp trickbot_loader32 behavioral1/memory/1440-66-0x00000000002C0000-0x00000000002ED000-memory.dmp trickbot_loader32 behavioral1/memory/588-73-0x0000000000D50000-0x0000000000D7D000-memory.dmp trickbot_loader32 behavioral1/memory/588-74-0x0000000000D50000-0x0000000000D7D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
ստանձնած.exeստանձնած.exepid process 1440 ստանձնած.exe 588 ստանձնած.exe -
Loads dropped DLL 2 IoCs
Processes:
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exepid process 1424 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe 1424 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 1632 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exeստանձնած.exeստանձնած.exepid process 1424 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe 1440 ստանձնած.exe 588 ստանձնած.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exeստանձնած.exetaskeng.exeստանձնած.exedescription pid process target process PID 1424 wrote to memory of 1440 1424 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe ստանձնած.exe PID 1424 wrote to memory of 1440 1424 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe ստանձնած.exe PID 1424 wrote to memory of 1440 1424 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe ստանձնած.exe PID 1424 wrote to memory of 1440 1424 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe ստանձնած.exe PID 1440 wrote to memory of 1960 1440 ստանձնած.exe svchost.exe PID 1440 wrote to memory of 1960 1440 ստանձնած.exe svchost.exe PID 1440 wrote to memory of 1960 1440 ստանձնած.exe svchost.exe PID 1440 wrote to memory of 1960 1440 ստանձնած.exe svchost.exe PID 1440 wrote to memory of 1960 1440 ստանձնած.exe svchost.exe PID 1440 wrote to memory of 1960 1440 ստանձնած.exe svchost.exe PID 328 wrote to memory of 588 328 taskeng.exe ստանձնած.exe PID 328 wrote to memory of 588 328 taskeng.exe ստանձնած.exe PID 328 wrote to memory of 588 328 taskeng.exe ստանձնած.exe PID 328 wrote to memory of 588 328 taskeng.exe ստանձնած.exe PID 588 wrote to memory of 1632 588 ստանձնած.exe svchost.exe PID 588 wrote to memory of 1632 588 ստանձնած.exe svchost.exe PID 588 wrote to memory of 1632 588 ստանձնած.exe svchost.exe PID 588 wrote to memory of 1632 588 ստանձնած.exe svchost.exe PID 588 wrote to memory of 1632 588 ստանձնած.exe svchost.exe PID 588 wrote to memory of 1632 588 ստանձնած.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe"C:\Users\Admin\AppData\Local\Temp\415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\ստանձնած.exe"C:\ProgramData\ստանձնած.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {2E23CDE0-EE00-47F7-9397-F91965F70E33} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\iCloud\ստանձնած.exeC:\Users\Admin\AppData\Roaming\iCloud\ստանձնած.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
C:\ProgramData\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
C:\ProgramData\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
C:\Users\Admin\AppData\Roaming\iCloud\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
C:\Users\Admin\AppData\Roaming\iCloud\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
\ProgramData\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
\ProgramData\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
memory/588-73-0x0000000000D50000-0x0000000000D7D000-memory.dmpFilesize
180KB
-
memory/588-74-0x0000000000D50000-0x0000000000D7D000-memory.dmpFilesize
180KB
-
memory/1440-64-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1440-65-0x00000000002C0000-0x00000000002ED000-memory.dmpFilesize
180KB
-
memory/1440-67-0x0000000010001000-0x0000000010005000-memory.dmpFilesize
16KB
-
memory/1440-66-0x00000000002C0000-0x00000000002ED000-memory.dmpFilesize
180KB
-
memory/1632-75-0x00000000000E0000-0x00000000000FD000-memory.dmpFilesize
116KB
-
memory/1632-76-0x00000000000E0000-0x00000000000FD000-memory.dmpFilesize
116KB
-
memory/1960-68-0x0000000000060000-0x000000000007D000-memory.dmpFilesize
116KB
-
memory/1960-70-0x0000000000060000-0x000000000007D000-memory.dmpFilesize
116KB