Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
Trusteer.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Trusteer.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
__MACOSX/._Trusteer.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
__MACOSX/._Trusteer.exe
Resource
win10v2004-20240226-en
General
-
Target
Trusteer.exe
-
Size
3.3MB
-
MD5
30cb49e14aa0f3247110df5dc1a1690b
-
SHA1
84521809033b25b01338e3087881d4c37b4d0faa
-
SHA256
2ad801c4a4f232b02c940858d69c3d3608c6df1606b73c76494e1d7d0d30e761
-
SHA512
c206045d0c2ba0dfc773bb5b41db0802127d86d521b6fe41523d63e59b79a2657dd960b3ca1dc1be31298279d920f3080a5e72803cd11fe261b32e08cd3577e9
-
SSDEEP
49152:p7RUQh1V1fO/9DA0q3i9aLrsvHyR15U8dJAsgWpyTulz9b9H5vDCjeMeZi7uax:p711TMeS92r1155A/0ysPZvej3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trusteer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trusteer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trusteer.exe -
Executes dropped EXE 1 IoCs
pid Process 3692 GetX64BTIT.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Software\Wine Trusteer.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 57 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 540 Trusteer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 540 set thread context of 3848 540 Trusteer.exe 94 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 540 Trusteer.exe 540 Trusteer.exe 540 Trusteer.exe 540 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe 3848 Trusteer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3848 Trusteer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 540 wrote to memory of 3848 540 Trusteer.exe 94 PID 3848 wrote to memory of 3692 3848 Trusteer.exe 95 PID 3848 wrote to memory of 3692 3848 Trusteer.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"3⤵
- Executes dropped EXE
PID:3692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5789e87462a40fc88463756828e3188a8
SHA1aef5c5169d30a711c4f2752f73363d93875943a0
SHA256b96c85480cfb60b82d95fcf6135a1efca96437553fed56228fbb87e85e89bedd
SHA5127afb1ca75cd529192126cf153cc90137573d83c7d2bc90ea4e7fdbd2180cf9b3f4210bcacc5fb24c95a1d2423af947a0cd50bcfd043df109161c2036b9606b54