Resubmissions
19-07-2023 06:20
230719-g3xdvagb67 1009-07-2023 07:36
230709-jfjkksbb93 1009-07-2023 07:21
230709-h61fcabh6t 10Analysis
-
max time kernel
1782s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 06:20
Static task
static1
Behavioral task
behavioral1
Sample
83817ff8228a54exeexeexeex.exe
Resource
win7-20230712-en
General
-
Target
83817ff8228a54exeexeexeex.exe
-
Size
527KB
-
MD5
83817ff8228a54ebef4c323a770e5481
-
SHA1
8fbc2b17032af8a7ce7c3065305892854277cfa9
-
SHA256
23b52343e9f52f72d0bb7b3d0ecc74a54c812f5b8f1143ef10daca23977858ee
-
SHA512
e1606094ebe36b18847b8e63c4e5bdc72827bc498261ed4f9356e143d6c6686187a7663b2b8b9b17f06d65df9f3e8084e74c9091dede372d018bd8ade547c45c
-
SSDEEP
12288:Zx1Q61iHsXYvfVpMODDawkCurdEtttY4jVHVEGGJL:ZXQUIsQpMsequrmGmVEjZ
Malware Config
Signatures
-
Trickbot x86 loader 10 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1796-144-0x0000000002230000-0x000000000225E000-memory.dmp trickbot_loader32 behavioral2/memory/1796-145-0x0000000002170000-0x000000000219C000-memory.dmp trickbot_loader32 behavioral2/memory/1796-147-0x0000000002230000-0x000000000225E000-memory.dmp trickbot_loader32 behavioral2/memory/1796-150-0x0000000002230000-0x000000000225E000-memory.dmp trickbot_loader32 behavioral2/memory/1512-159-0x0000000000E30000-0x0000000000E5E000-memory.dmp trickbot_loader32 behavioral2/memory/1512-162-0x0000000000E30000-0x0000000000E5E000-memory.dmp trickbot_loader32 behavioral2/memory/2132-170-0x0000000000E50000-0x0000000000E7E000-memory.dmp trickbot_loader32 behavioral2/memory/2132-173-0x0000000000E50000-0x0000000000E7E000-memory.dmp trickbot_loader32 behavioral2/memory/1696-181-0x0000000000E70000-0x0000000000E9E000-memory.dmp trickbot_loader32 behavioral2/memory/1696-183-0x0000000000E70000-0x0000000000E9E000-memory.dmp trickbot_loader32 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation 83817ff8228a54exeexeexeex.exe -
Executes dropped EXE 4 IoCs
pid Process 1796 аНаоすは래별.exe 1512 аНаоすは래별.exe 2132 аНаоすは래별.exe 1696 аНаоすは래별.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3356 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4172 83817ff8228a54exeexeexeex.exe 4172 83817ff8228a54exeexeexeex.exe 1796 аНаоすは래별.exe 1796 аНаоすは래별.exe 1512 аНаоすは래별.exe 1512 аНаоすは래별.exe 2132 аНаоすは래별.exe 2132 аНаоすは래별.exe 1696 аНаоすは래별.exe 1696 аНаоすは래별.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1796 4172 83817ff8228a54exeexeexeex.exe 86 PID 4172 wrote to memory of 1796 4172 83817ff8228a54exeexeexeex.exe 86 PID 4172 wrote to memory of 1796 4172 83817ff8228a54exeexeexeex.exe 86 PID 1796 wrote to memory of 4160 1796 аНаоすは래별.exe 91 PID 1796 wrote to memory of 4160 1796 аНаоすは래별.exe 91 PID 1796 wrote to memory of 4160 1796 аНаоすは래별.exe 91 PID 1796 wrote to memory of 4160 1796 аНаоすは래별.exe 91 PID 1512 wrote to memory of 3356 1512 аНаоすは래별.exe 105 PID 1512 wrote to memory of 3356 1512 аНаоすは래별.exe 105 PID 1512 wrote to memory of 3356 1512 аНаоすは래별.exe 105 PID 1512 wrote to memory of 3356 1512 аНаоすは래별.exe 105 PID 2132 wrote to memory of 2588 2132 аНаоすは래별.exe 108 PID 2132 wrote to memory of 2588 2132 аНаоすは래별.exe 108 PID 2132 wrote to memory of 2588 2132 аНаоすは래별.exe 108 PID 2132 wrote to memory of 2588 2132 аНаоすは래별.exe 108 PID 1696 wrote to memory of 4532 1696 аНаоすは래별.exe 110 PID 1696 wrote to memory of 4532 1696 аНаоすは래별.exe 110 PID 1696 wrote to memory of 4532 1696 аНаоすは래별.exe 110 PID 1696 wrote to memory of 4532 1696 аНаоすは래별.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\83817ff8228a54exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\83817ff8228a54exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\ProgramData\аНаоすは래별.exe"C:\ProgramData\аНаоすは래별.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4160
-
-
-
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2588
-
-
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4532
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\a66bd7feb447f8b1699185a734437579_4dc48ea0-ec1c-4c48-ab6a-6232968c18bf
Filesize50B
MD5815494c1565d6f512e25d0d0ac396d0a
SHA1f67b40b0c8972cc4f5e322044ae83d5a2d953559
SHA256958afa4bfd0f9e5dba2992593cff21a948557305fd665c1daea09d22f5ba205e
SHA512315f556dfc436a72112855ead04a0f348f99e656c6291fd604169cf7a4ee52f4fa94e2f97992116d52b366a21c1bc491c004b8275fb5c6ab8557aa4c9476e585
-
Filesize
527KB
MD583817ff8228a54ebef4c323a770e5481
SHA18fbc2b17032af8a7ce7c3065305892854277cfa9
SHA25623b52343e9f52f72d0bb7b3d0ecc74a54c812f5b8f1143ef10daca23977858ee
SHA512e1606094ebe36b18847b8e63c4e5bdc72827bc498261ed4f9356e143d6c6686187a7663b2b8b9b17f06d65df9f3e8084e74c9091dede372d018bd8ade547c45c
-
Filesize
527KB
MD583817ff8228a54ebef4c323a770e5481
SHA18fbc2b17032af8a7ce7c3065305892854277cfa9
SHA25623b52343e9f52f72d0bb7b3d0ecc74a54c812f5b8f1143ef10daca23977858ee
SHA512e1606094ebe36b18847b8e63c4e5bdc72827bc498261ed4f9356e143d6c6686187a7663b2b8b9b17f06d65df9f3e8084e74c9091dede372d018bd8ade547c45c
-
Filesize
527KB
MD583817ff8228a54ebef4c323a770e5481
SHA18fbc2b17032af8a7ce7c3065305892854277cfa9
SHA25623b52343e9f52f72d0bb7b3d0ecc74a54c812f5b8f1143ef10daca23977858ee
SHA512e1606094ebe36b18847b8e63c4e5bdc72827bc498261ed4f9356e143d6c6686187a7663b2b8b9b17f06d65df9f3e8084e74c9091dede372d018bd8ade547c45c
-
Filesize
17KB
MD5ff930f8a47b91c7b024f1ff2949b5841
SHA1aeaba4ab21ba76566f33cd7c9cd7272dea1ae172
SHA25633f7cafbfa0f5fafc62f8733231f12a6a41f6a782118db6cd914e334586f30a9
SHA512af507769be6e43ebf0c713ad91dc2c366b49b00e8d293c3a467ba21feb382de10ea7793d0699cf72a76d1c9723c4fc861c65b78cb6e8fbdcd5c219b94a32bc04
-
Filesize
527KB
MD583817ff8228a54ebef4c323a770e5481
SHA18fbc2b17032af8a7ce7c3065305892854277cfa9
SHA25623b52343e9f52f72d0bb7b3d0ecc74a54c812f5b8f1143ef10daca23977858ee
SHA512e1606094ebe36b18847b8e63c4e5bdc72827bc498261ed4f9356e143d6c6686187a7663b2b8b9b17f06d65df9f3e8084e74c9091dede372d018bd8ade547c45c
-
Filesize
527KB
MD583817ff8228a54ebef4c323a770e5481
SHA18fbc2b17032af8a7ce7c3065305892854277cfa9
SHA25623b52343e9f52f72d0bb7b3d0ecc74a54c812f5b8f1143ef10daca23977858ee
SHA512e1606094ebe36b18847b8e63c4e5bdc72827bc498261ed4f9356e143d6c6686187a7663b2b8b9b17f06d65df9f3e8084e74c9091dede372d018bd8ade547c45c
-
Filesize
527KB
MD583817ff8228a54ebef4c323a770e5481
SHA18fbc2b17032af8a7ce7c3065305892854277cfa9
SHA25623b52343e9f52f72d0bb7b3d0ecc74a54c812f5b8f1143ef10daca23977858ee
SHA512e1606094ebe36b18847b8e63c4e5bdc72827bc498261ed4f9356e143d6c6686187a7663b2b8b9b17f06d65df9f3e8084e74c9091dede372d018bd8ade547c45c
-
Filesize
527KB
MD583817ff8228a54ebef4c323a770e5481
SHA18fbc2b17032af8a7ce7c3065305892854277cfa9
SHA25623b52343e9f52f72d0bb7b3d0ecc74a54c812f5b8f1143ef10daca23977858ee
SHA512e1606094ebe36b18847b8e63c4e5bdc72827bc498261ed4f9356e143d6c6686187a7663b2b8b9b17f06d65df9f3e8084e74c9091dede372d018bd8ade547c45c