Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
96473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d.exe
Resource
win7-20240508-en
General
-
Target
96473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d.exe
-
Size
1.0MB
-
MD5
48544712cf040eac4b968f6b25665096
-
SHA1
c55f5bc4ad221088203a4e997e71a3d1febc44f4
-
SHA256
96473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d
-
SHA512
f2e53a9a22e972ad062bc957b63b6c0f057a7251e91afbbcf505693627e8e7dc6bd788c1bdfb50ff460cd09e2f414af96f41df116c8eac2b4efca8afcdd11179
-
SSDEEP
24576:zQ5aILMCfmAUhrSO1YNWdvCzMPqdUD6dNDmw8:E5aIwC+AUBsWsXH8
Malware Config
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1896-15-0x0000000002280000-0x00000000022A9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
pid Process 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTcbPrivilege 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe Token: SeTcbPrivilege 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1896 96473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d.exe 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2344 1896 96473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d.exe 84 PID 1896 wrote to memory of 2344 1896 96473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d.exe 84 PID 1896 wrote to memory of 2344 1896 96473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d.exe 84 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 2344 wrote to memory of 3036 2344 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 85 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 3632 wrote to memory of 4796 3632 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 106 PID 948 wrote to memory of 4332 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 111 PID 948 wrote to memory of 4332 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 111 PID 948 wrote to memory of 4332 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 111 PID 948 wrote to memory of 4332 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 111 PID 948 wrote to memory of 4332 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 111 PID 948 wrote to memory of 4332 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 111 PID 948 wrote to memory of 4332 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 111 PID 948 wrote to memory of 4332 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 111 PID 948 wrote to memory of 4332 948 97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\96473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d.exe"C:\Users\Admin\AppData\Local\Temp\96473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Roaming\WinSocket\97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exeC:\Users\Admin\AppData\Roaming\WinSocket\97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3036
-
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exeC:\Users\Admin\AppData\Roaming\WinSocket\97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4796
-
-
C:\Users\Admin\AppData\Roaming\WinSocket\97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exeC:\Users\Admin\AppData\Roaming\WinSocket\97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\97483013b60d831993182190f37866a894bcbf7e844ac29970a844ea3cfec93d.exe
Filesize1.0MB
MD548544712cf040eac4b968f6b25665096
SHA1c55f5bc4ad221088203a4e997e71a3d1febc44f4
SHA25696473013b50d731993172180f36755a794bcbf6e744ac28960a744ea3cfec83d
SHA512f2e53a9a22e972ad062bc957b63b6c0f057a7251e91afbbcf505693627e8e7dc6bd788c1bdfb50ff460cd09e2f414af96f41df116c8eac2b4efca8afcdd11179
-
Filesize
49KB
MD53caa7c300dca364876bdc40747ebd083
SHA1ac762f23097a12a69d825988a9ddcc234891c48d
SHA256806aa280470fc32b52bd595a45df0b59f4359432b00230cecb61821d32462f95
SHA512e869b42e26be9b89162e3090df807195b4141b4adb748cd41b42869ce659ceb9013566984c2b1547cd2873c3ef218deb9a5cef3f981c896cf33fca6400413535