Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 15:50
Static task
static1
Behavioral task
behavioral1
Sample
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe
Resource
win7-20230220-en
General
-
Target
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe
-
Size
663KB
-
MD5
367b6a5c0e0e8ec68ea14a085b1d32b3
-
SHA1
d02f452d01660387fd78d40e9f2405c3e38c9668
-
SHA256
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
-
SHA512
6e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
SSDEEP
12288:nO4BydKj3ACZfNFEnw6qJxs3UPwgDrZiI0OSnnox7Yu:OOyO3YnwFRPVXZf09nMD
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4368-142-0x00000000021A0000-0x00000000021CD000-memory.dmp trickbot_loader32 behavioral2/memory/4368-143-0x00000000021A0000-0x00000000021CD000-memory.dmp trickbot_loader32 behavioral2/memory/3228-150-0x0000000000E40000-0x0000000000E6D000-memory.dmp trickbot_loader32 behavioral2/memory/3228-151-0x0000000000E40000-0x0000000000E6D000-memory.dmp trickbot_loader32 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe -
Executes dropped EXE 2 IoCs
Processes:
ստանձնած.exeստանձնած.exepid process 4368 ստանձնած.exe 3228 ստանձնած.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 2668 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exeստանձնած.exeստանձնած.exepid process 3064 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe 4368 ստանձնած.exe 3228 ստանձնած.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exeստանձնած.exeստանձնած.exedescription pid process target process PID 3064 wrote to memory of 4368 3064 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe ստանձնած.exe PID 3064 wrote to memory of 4368 3064 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe ստանձնած.exe PID 3064 wrote to memory of 4368 3064 415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe ստանձնած.exe PID 4368 wrote to memory of 3944 4368 ստանձնած.exe svchost.exe PID 4368 wrote to memory of 3944 4368 ստանձնած.exe svchost.exe PID 4368 wrote to memory of 3944 4368 ստանձնած.exe svchost.exe PID 4368 wrote to memory of 3944 4368 ստանձնած.exe svchost.exe PID 3228 wrote to memory of 2668 3228 ստանձնած.exe svchost.exe PID 3228 wrote to memory of 2668 3228 ստանձնած.exe svchost.exe PID 3228 wrote to memory of 2668 3228 ստանձնած.exe svchost.exe PID 3228 wrote to memory of 2668 3228 ստանձնած.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe"C:\Users\Admin\AppData\Local\Temp\415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\ստանձնած.exe"C:\ProgramData\ստանձնած.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\iCloud\ստանձնած.exeC:\Users\Admin\AppData\Roaming\iCloud\ստանձնած.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
C:\ProgramData\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
C:\ProgramData\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
C:\Users\Admin\AppData\Roaming\iCloud\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
C:\Users\Admin\AppData\Roaming\iCloud\ստանձնած.exeFilesize
663KB
MD5367b6a5c0e0e8ec68ea14a085b1d32b3
SHA1d02f452d01660387fd78d40e9f2405c3e38c9668
SHA256415e04eb340f1b092288cbcc71295a2c95e864fc1bbfcd55d6e3f5aa67099b1a
SHA5126e07cd2dbbd729154b57afff569c9c9bc0e3cc23779698680c2f642cd9029fbe33a24222d9096599e8a54b43bc5eefe0b4590502093e0e35b9b769c67426d2d4
-
memory/2668-154-0x0000022432120000-0x000002243213D000-memory.dmpFilesize
116KB
-
memory/2668-152-0x0000022432120000-0x000002243213D000-memory.dmpFilesize
116KB
-
memory/3228-150-0x0000000000E40000-0x0000000000E6D000-memory.dmpFilesize
180KB
-
memory/3228-151-0x0000000000E40000-0x0000000000E6D000-memory.dmpFilesize
180KB
-
memory/3944-145-0x0000017ADCFA0000-0x0000017ADCFBD000-memory.dmpFilesize
116KB
-
memory/3944-147-0x0000017ADCFA0000-0x0000017ADCFBD000-memory.dmpFilesize
116KB
-
memory/4368-142-0x00000000021A0000-0x00000000021CD000-memory.dmpFilesize
180KB
-
memory/4368-144-0x0000000010001000-0x0000000010005000-memory.dmpFilesize
16KB
-
memory/4368-143-0x00000000021A0000-0x00000000021CD000-memory.dmpFilesize
180KB
-
memory/4368-141-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB