Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 19:16
Static task
static1
Behavioral task
behavioral1
Sample
172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe
Resource
win7-20231023-en
General
-
Target
172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe
-
Size
376KB
-
MD5
3f21654dcb2feefc61a27d3abec33568
-
SHA1
f6f44cefee7e15d55f754ea568f9b00b3f88f0ef
-
SHA256
172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd
-
SHA512
322eb13aa1a551322e8406d34430a522c44a86dc5fd191572756bfc8cb6233f8fd4d1b5c3c3c7c27523ecbacd2284cedb7e4601cf65c7ec5245652645f3530f1
-
SSDEEP
6144:yCISL+Svs95brBcgFDrSQw0yr8FW7UCcyCIoT14yXVJFuvYZEOg2qfKku:mS1k95PLDu/f8FW7UbGoP0Y7gbf9u
Malware Config
Extracted
trickbot
1000131
tt0002
212.14.51.43:449
212.14.51.56:449
206.255.220.53:449
181.175.124.212:449
82.202.246.160:443
82.202.236.61:443
82.202.212.31:443
212.92.98.95:443
92.53.77.167:443
83.220.170.11:443
212.109.221.108:443
83.220.170.3:443
80.87.197.221:443
83.220.170.83:443
185.224.215.224:443
83.220.170.165:443
195.133.147.153:443
92.53.67.155:443
194.87.92.162:443
95.213.194.111:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 2716 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 3852 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 2500 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 2956 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 74 myexternalip.com -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3268 set thread context of 2176 3268 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 89 PID 3128 set thread context of 2464 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 93 PID 2716 set thread context of 3852 2716 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 112 PID 2500 set thread context of 2956 2500 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 116 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3852 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe Token: SeTcbPrivilege 2956 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3268 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 2716 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 2500 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 2176 3268 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 89 PID 3268 wrote to memory of 2176 3268 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 89 PID 3268 wrote to memory of 2176 3268 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 89 PID 3268 wrote to memory of 2176 3268 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 89 PID 3268 wrote to memory of 2176 3268 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 89 PID 3268 wrote to memory of 2176 3268 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 89 PID 3268 wrote to memory of 2176 3268 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 89 PID 2176 wrote to memory of 3128 2176 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 90 PID 2176 wrote to memory of 3128 2176 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 90 PID 2176 wrote to memory of 3128 2176 172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe 90 PID 3128 wrote to memory of 2464 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 93 PID 3128 wrote to memory of 2464 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 93 PID 3128 wrote to memory of 2464 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 93 PID 3128 wrote to memory of 2464 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 93 PID 3128 wrote to memory of 2464 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 93 PID 3128 wrote to memory of 2464 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 93 PID 3128 wrote to memory of 2464 3128 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 93 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 PID 2464 wrote to memory of 4764 2464 182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe"C:\Users\Admin\AppData\Local\Temp\172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe"C:\Users\Admin\AppData\Local\Temp\172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exeC:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exeC:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs5⤵PID:4764
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exeC:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exeC:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:2468
-
-
-
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exeC:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2500 -
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exeC:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe
Filesize376KB
MD53f21654dcb2feefc61a27d3abec33568
SHA1f6f44cefee7e15d55f754ea568f9b00b3f88f0ef
SHA256172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd
SHA512322eb13aa1a551322e8406d34430a522c44a86dc5fd191572756bfc8cb6233f8fd4d1b5c3c3c7c27523ecbacd2284cedb7e4601cf65c7ec5245652645f3530f1
-
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe
Filesize376KB
MD53f21654dcb2feefc61a27d3abec33568
SHA1f6f44cefee7e15d55f754ea568f9b00b3f88f0ef
SHA256172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd
SHA512322eb13aa1a551322e8406d34430a522c44a86dc5fd191572756bfc8cb6233f8fd4d1b5c3c3c7c27523ecbacd2284cedb7e4601cf65c7ec5245652645f3530f1
-
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe
Filesize376KB
MD53f21654dcb2feefc61a27d3abec33568
SHA1f6f44cefee7e15d55f754ea568f9b00b3f88f0ef
SHA256172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd
SHA512322eb13aa1a551322e8406d34430a522c44a86dc5fd191572756bfc8cb6233f8fd4d1b5c3c3c7c27523ecbacd2284cedb7e4601cf65c7ec5245652645f3530f1
-
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe
Filesize376KB
MD53f21654dcb2feefc61a27d3abec33568
SHA1f6f44cefee7e15d55f754ea568f9b00b3f88f0ef
SHA256172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd
SHA512322eb13aa1a551322e8406d34430a522c44a86dc5fd191572756bfc8cb6233f8fd4d1b5c3c3c7c27523ecbacd2284cedb7e4601cf65c7ec5245652645f3530f1
-
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe
Filesize376KB
MD53f21654dcb2feefc61a27d3abec33568
SHA1f6f44cefee7e15d55f754ea568f9b00b3f88f0ef
SHA256172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd
SHA512322eb13aa1a551322e8406d34430a522c44a86dc5fd191572756bfc8cb6233f8fd4d1b5c3c3c7c27523ecbacd2284cedb7e4601cf65c7ec5245652645f3530f1
-
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe
Filesize376KB
MD53f21654dcb2feefc61a27d3abec33568
SHA1f6f44cefee7e15d55f754ea568f9b00b3f88f0ef
SHA256172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd
SHA512322eb13aa1a551322e8406d34430a522c44a86dc5fd191572756bfc8cb6233f8fd4d1b5c3c3c7c27523ecbacd2284cedb7e4601cf65c7ec5245652645f3530f1
-
C:\Users\Admin\AppData\Roaming\GoogleService\182c408ffc96db192ee6fa22a709f317607ff9893b704914c0e1cefcfc0e2efd.exe
Filesize376KB
MD53f21654dcb2feefc61a27d3abec33568
SHA1f6f44cefee7e15d55f754ea568f9b00b3f88f0ef
SHA256172c407ffc85db182ee5fa22a609f316506ff9783b604914c0e1cefcfc0e2efd
SHA512322eb13aa1a551322e8406d34430a522c44a86dc5fd191572756bfc8cb6233f8fd4d1b5c3c3c7c27523ecbacd2284cedb7e4601cf65c7ec5245652645f3530f1