Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 21:06
Static task
static1
Behavioral task
behavioral1
Sample
Trusteer.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Trusteer.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
__MACOSX/._Trusteer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
__MACOSX/._Trusteer.exe
Resource
win10v2004-20240226-en
General
-
Target
Trusteer.exe
-
Size
3.3MB
-
MD5
30cb49e14aa0f3247110df5dc1a1690b
-
SHA1
84521809033b25b01338e3087881d4c37b4d0faa
-
SHA256
2ad801c4a4f232b02c940858d69c3d3608c6df1606b73c76494e1d7d0d30e761
-
SHA512
c206045d0c2ba0dfc773bb5b41db0802127d86d521b6fe41523d63e59b79a2657dd960b3ca1dc1be31298279d920f3080a5e72803cd11fe261b32e08cd3577e9
-
SSDEEP
49152:p7RUQh1V1fO/9DA0q3i9aLrsvHyR15U8dJAsgWpyTulz9b9H5vDCjeMeZi7uax:p711TMeS92r1155A/0ysPZvej3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Trusteer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trusteer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Trusteer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trusteer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trusteer.exe -
Executes dropped EXE 1 IoCs
Processes:
GetX64BTIT.exepid process 1560 GetX64BTIT.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
Trusteer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Wine Trusteer.exe -
Loads dropped DLL 1 IoCs
Processes:
Trusteer.exepid process 2804 Trusteer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Trusteer.exepid process 2044 Trusteer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Trusteer.exedescription pid process target process PID 2044 set thread context of 2804 2044 Trusteer.exe Trusteer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Trusteer.exeTrusteer.exepid process 2044 Trusteer.exe 2044 Trusteer.exe 2044 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe 2804 Trusteer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Trusteer.exepid process 2804 Trusteer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Trusteer.exeTrusteer.exedescription pid process target process PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2044 wrote to memory of 2804 2044 Trusteer.exe Trusteer.exe PID 2804 wrote to memory of 1560 2804 Trusteer.exe GetX64BTIT.exe PID 2804 wrote to memory of 1560 2804 Trusteer.exe GetX64BTIT.exe PID 2804 wrote to memory of 1560 2804 Trusteer.exe GetX64BTIT.exe PID 2804 wrote to memory of 1560 2804 Trusteer.exe GetX64BTIT.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"3⤵
- Executes dropped EXE
PID:1560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD52f1184446c98a2aa0b839e6ccfa0138d
SHA11039dbc26b41064cc115e9e9b01a0c87ab3d32c2
SHA25607ca853622f60858c308e3eb566b4b41534bc2b6ad5877967efa89adf0f8f20f
SHA51256abe97f689ba9ef215dac06cf506cf2507c3ab7f4e1b9667a76c34ca13d652fdd6271f5da173101231a86f237e9988fd3a76f1dc18e0c8fe6d278f37787d14d