Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 07:14
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.d4556afb877184a023e522c7ff762550.exe
Resource
win7-20231020-en
General
-
Target
NEAS.d4556afb877184a023e522c7ff762550.exe
-
Size
613KB
-
MD5
d4556afb877184a023e522c7ff762550
-
SHA1
84134a9035e1b3df8b3b850d4a4f78b8425824ce
-
SHA256
8d6a0bc1fd32d4472a02505704e3ea4b5385035b2260665a73e87bf1efea9f65
-
SHA512
3490f9d316af9a04ec860adec203b771553b8d4807729322d9b761d61e8d4c50b8b404a1574958e9bd1d54dac0c7e98d130f05630ad3d73ab7639ed188975c1c
-
SSDEEP
6144:zJB0PLonpe1h5fqpErm9cRLBOtFWaCfmAU+wDhuXCyW8bQQG7NpAv5Zk:zJB0lh5aILwtFPCfmAUtxjEG7NpAv5m
Malware Config
Signatures
-
Trickbot x86 loader 9 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2112-15-0x00000000023D0000-0x00000000023F9000-memory.dmp trickbot_loader32 behavioral2/memory/2112-19-0x00000000023D0000-0x00000000023F9000-memory.dmp trickbot_loader32 behavioral2/memory/2112-25-0x00000000023D0000-0x00000000023F9000-memory.dmp trickbot_loader32 behavioral2/memory/4476-44-0x0000000002AC0000-0x0000000002AE9000-memory.dmp trickbot_loader32 behavioral2/memory/4476-59-0x0000000002AC0000-0x0000000002AE9000-memory.dmp trickbot_loader32 behavioral2/memory/4868-80-0x0000000001610000-0x0000000001639000-memory.dmp trickbot_loader32 behavioral2/memory/4868-94-0x0000000001610000-0x0000000001639000-memory.dmp trickbot_loader32 behavioral2/memory/4100-117-0x00000000016B0000-0x00000000016D9000-memory.dmp trickbot_loader32 behavioral2/memory/4100-131-0x00000000016B0000-0x00000000016D9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 4100 NFAS.d4556afb877184a023e522c7ff762550.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 4868 NFAS.d4556afb877184a023e522c7ff762550.exe Token: SeTcbPrivilege 4100 NFAS.d4556afb877184a023e522c7ff762550.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2112 NEAS.d4556afb877184a023e522c7ff762550.exe 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 4100 NFAS.d4556afb877184a023e522c7ff762550.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4476 2112 NEAS.d4556afb877184a023e522c7ff762550.exe 86 PID 2112 wrote to memory of 4476 2112 NEAS.d4556afb877184a023e522c7ff762550.exe 86 PID 2112 wrote to memory of 4476 2112 NEAS.d4556afb877184a023e522c7ff762550.exe 86 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4476 wrote to memory of 4848 4476 NFAS.d4556afb877184a023e522c7ff762550.exe 87 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4868 wrote to memory of 1748 4868 NFAS.d4556afb877184a023e522c7ff762550.exe 102 PID 4100 wrote to memory of 2552 4100 NFAS.d4556afb877184a023e522c7ff762550.exe 116 PID 4100 wrote to memory of 2552 4100 NFAS.d4556afb877184a023e522c7ff762550.exe 116 PID 4100 wrote to memory of 2552 4100 NFAS.d4556afb877184a023e522c7ff762550.exe 116 PID 4100 wrote to memory of 2552 4100 NFAS.d4556afb877184a023e522c7ff762550.exe 116 PID 4100 wrote to memory of 2552 4100 NFAS.d4556afb877184a023e522c7ff762550.exe 116 PID 4100 wrote to memory of 2552 4100 NFAS.d4556afb877184a023e522c7ff762550.exe 116 PID 4100 wrote to memory of 2552 4100 NFAS.d4556afb877184a023e522c7ff762550.exe 116 PID 4100 wrote to memory of 2552 4100 NFAS.d4556afb877184a023e522c7ff762550.exe 116 PID 4100 wrote to memory of 2552 4100 NFAS.d4556afb877184a023e522c7ff762550.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.d4556afb877184a023e522c7ff762550.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.d4556afb877184a023e522c7ff762550.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.d4556afb877184a023e522c7ff762550.exeC:\Users\Admin\AppData\Roaming\WinSocket\NFAS.d4556afb877184a023e522c7ff762550.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4848
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.d4556afb877184a023e522c7ff762550.exeC:\Users\Admin\AppData\Roaming\WinSocket\NFAS.d4556afb877184a023e522c7ff762550.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1748
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\NFAS.d4556afb877184a023e522c7ff762550.exeC:\Users\Admin\AppData\Roaming\WinSocket\NFAS.d4556afb877184a023e522c7ff762550.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
613KB
MD5d4556afb877184a023e522c7ff762550
SHA184134a9035e1b3df8b3b850d4a4f78b8425824ce
SHA2568d6a0bc1fd32d4472a02505704e3ea4b5385035b2260665a73e87bf1efea9f65
SHA5123490f9d316af9a04ec860adec203b771553b8d4807729322d9b761d61e8d4c50b8b404a1574958e9bd1d54dac0c7e98d130f05630ad3d73ab7639ed188975c1c
-
Filesize
613KB
MD5d4556afb877184a023e522c7ff762550
SHA184134a9035e1b3df8b3b850d4a4f78b8425824ce
SHA2568d6a0bc1fd32d4472a02505704e3ea4b5385035b2260665a73e87bf1efea9f65
SHA5123490f9d316af9a04ec860adec203b771553b8d4807729322d9b761d61e8d4c50b8b404a1574958e9bd1d54dac0c7e98d130f05630ad3d73ab7639ed188975c1c
-
Filesize
613KB
MD5d4556afb877184a023e522c7ff762550
SHA184134a9035e1b3df8b3b850d4a4f78b8425824ce
SHA2568d6a0bc1fd32d4472a02505704e3ea4b5385035b2260665a73e87bf1efea9f65
SHA5123490f9d316af9a04ec860adec203b771553b8d4807729322d9b761d61e8d4c50b8b404a1574958e9bd1d54dac0c7e98d130f05630ad3d73ab7639ed188975c1c
-
Filesize
613KB
MD5d4556afb877184a023e522c7ff762550
SHA184134a9035e1b3df8b3b850d4a4f78b8425824ce
SHA2568d6a0bc1fd32d4472a02505704e3ea4b5385035b2260665a73e87bf1efea9f65
SHA5123490f9d316af9a04ec860adec203b771553b8d4807729322d9b761d61e8d4c50b8b404a1574958e9bd1d54dac0c7e98d130f05630ad3d73ab7639ed188975c1c
-
Filesize
44KB
MD52fa68dfe4b49d54e59887ad25dc2a3ff
SHA126a328acb0b88c58bac4a07e79322933e5aab46d
SHA256c0751351719c6614e53479ad4e17981eb083d726810bbd7fab3040fb7b2f14f9
SHA512a8690cc6181d6a5ec353c9a55e0e9864c62a5b1fa6df4014de3ac1b4efdf56d809345310bb1e0dd4ee47019a38ea173c135f6798b7a8043fe8794a1389057e50