Overview
overview
10Static
static
10.exe/AppRe...er.exe
windows7-x64
3.exe/AppRe...er.exe
windows10-2004-x64
3.exe/Brows...ew.exe
windows7-x64
7.exe/Brows...ew.exe
windows10-2004-x64
7.exe/Brows...ew.exe
windows7-x64
7.exe/Brows...ew.exe
windows10-2004-x64
7.exe/CProcess.exe
windows7-x64
9.exe/CProcess.exe
windows10-2004-x64
9.exe/Execu...st.exe
windows7-x64
3.exe/Execu...st.exe
windows10-2004-x64
3.exe/Fortect.lnk
windows7-x64
1.exe/Fortect.lnk
windows10-2004-x64
3.exe/JournalTrace.exe
windows7-x64
1.exe/JournalTrace.exe
windows10-2004-x64
1.exe/LastA...ew.exe
windows7-x64
6.exe/LastA...ew.exe
windows10-2004-x64
6.exe/MUICacheView.exe
windows7-x64
9.exe/MUICacheView.exe
windows10-2004-x64
9.exe/Malwarebytes.lnk
windows7-x64
3.exe/Malwarebytes.lnk
windows10-2004-x64
3.exe/Previ...ry.exe
windows7-x64
3.exe/Previ...ry.exe
windows10-2004-x64
3.exe/Recen...ew.exe
windows7-x64
9.exe/Recen...ew.exe
windows10-2004-x64
9.exe/RegScanner.exe
windows7-x64
1.exe/RegScanner.exe
windows10-2004-x64
1.exe/Shell...ew.exe
windows7-x64
9.exe/Shell...ew.exe
windows10-2004-x64
9.exe/Syste...er.lnk
windows7-x64
3.exe/Syste...er.lnk
windows10-2004-x64
3.exe/TrappedV2.exe
windows7-x64
7.exe/TrappedV2.exe
windows10-2004-x64
7Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 02:37
Behavioral task
behavioral1
Sample
.exe/AppReadWriteCounter.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
.exe/AppReadWriteCounter.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
.exe/BrowserDownloadsView.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
.exe/BrowserDownloadsView.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
.exe/BrowsingHistoryView.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
.exe/BrowsingHistoryView.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
.exe/CProcess.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
.exe/CProcess.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
.exe/ExecutedProgramsList.exe
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
.exe/ExecutedProgramsList.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
.exe/Fortect.lnk
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
.exe/Fortect.lnk
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
.exe/JournalTrace.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
.exe/JournalTrace.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
.exe/LastActivityView.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
.exe/LastActivityView.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
.exe/MUICacheView.exe
Resource
win7-20240419-en
Behavioral task
behavioral18
Sample
.exe/MUICacheView.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
.exe/Malwarebytes.lnk
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
.exe/Malwarebytes.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
.exe/PreviousFilesRecovery.exe
Resource
win7-20240611-en
Behavioral task
behavioral22
Sample
.exe/PreviousFilesRecovery.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
.exe/RecentFilesView.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
.exe/RecentFilesView.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
.exe/RegScanner.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
.exe/RegScanner.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
.exe/ShellBagsView.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
.exe/ShellBagsView.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
.exe/System Informer.lnk
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
.exe/System Informer.lnk
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
.exe/TrappedV2.exe
Resource
win7-20240419-en
Behavioral task
behavioral32
Sample
.exe/TrappedV2.exe
Resource
win10v2004-20240508-en
General
-
Target
.exe/TrappedV2.exe
-
Size
7.5MB
-
MD5
185209c5c3f0e3871931a17b36f1be6b
-
SHA1
ac9d47c6aaef2fc9d4e4035eb480ae08fa5b7483
-
SHA256
c77e124816a70e05f72e5c147f503fe40e4629de344bab593039a194766ef79b
-
SHA512
66650e214dcd1c69115a78adbc72f959eba63022817fac39a7225b3c5d115d85754a6e3fccfc075b65e8665bf0a1c7b8edb5d8f30ab241819cf0dc27cd8e218b
-
SSDEEP
98304:OQXWQRZdDwG1eFsr7/AgecPlcGxH0Ig17E3AAy5tx54D/SVnovDJTSPkIuQoK:O2/DwGcsAgectcGfcY3gtCcKSPn
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
pid Process 1504 TrappedV2.exe 1504 TrappedV2.exe 1504 TrappedV2.exe 1504 TrappedV2.exe 1504 TrappedV2.exe 1504 TrappedV2.exe 1504 TrappedV2.exe 1504 TrappedV2.exe 1504 TrappedV2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3308 wrote to memory of 1504 3308 TrappedV2.exe 85 PID 3308 wrote to memory of 1504 3308 TrappedV2.exe 85 PID 1504 wrote to memory of 1976 1504 TrappedV2.exe 86 PID 1504 wrote to memory of 1976 1504 TrappedV2.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\.exe\TrappedV2.exe"C:\Users\Admin\AppData\Local\Temp\.exe\TrappedV2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\.exe\TrappedV2.exe"C:\Users\Admin\AppData\Local\Temp\.exe\TrappedV2.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1976
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
48KB
MD5cf0a1c4776ffe23ada5e570fc36e39fe
SHA12050fadecc11550ad9bde0b542bcf87e19d37f1a
SHA2566fd366a691ed68430bcd0a3de3d8d19a0cb2102952bfc140bbef4354ed082c47
SHA512d95cd98d22ca048d0fc5bca551c9db13d6fa705f6af120bbbb621cf2b30284bfdc7320d0a819bb26dab1e0a46253cc311a370bed4ef72ecb60c69791ed720168
-
Filesize
120KB
MD56114277c6fc040f68d25ca90e25924cd
SHA1028179c77cb3ba29cd8494049421eaa4900ccd0e
SHA256f07fe92ce85f7786f96a4d59c6ee5c05fe1db63a1889ba40a67e37069639b656
SHA51276e8ebefb9ba4ea8dcab8fce50629946af4f2b3f2f43163f75483cfb0a97968478c8aaef1d6a37be85bfc4c91a859deda6da21d3e753daefe084a203d839353d
-
Filesize
1.8MB
MD5bbbf46529c77f766ef219f4c146e6ef5
SHA1de07c922c7f4ba08bc1a62cf3fabddecc64f877e
SHA256734e277712e823fca86ca75bf5d4f85a21893208e683c4ab407be10c3b9052dc
SHA5123371a3a806dac2cfec59cc42937b348af67e190a8d575efc6a81ec3d8b215f8a0cb94010142f9d02c8881040a2d6b8364d124f85285d9b3b04f36226fb4fae66
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
131KB
MD590b786dc6795d8ad0870e290349b5b52
SHA1592c54e67cf5d2d884339e7a8d7a21e003e6482f
SHA25689f2a5c6be1e70b3d895318fdd618506b8c0e9a63b6a1a4055dff4abdc89f18a
SHA512c6e1dbf25d260c723a26c88ec027d40d47f5e28fc9eb2dbc72a88813a1d05c7f75616b31836b68b87df45c65eef6f3eaed2a9f9767f9e2f12c45f672c2116e72
-
Filesize
130KB
MD51d6762b494dc9e60ca95f7238ae1fb14
SHA1aa0397d96a0ed41b2f03352049dafe040d59ad5d
SHA256fae5323e2119a8f678055f4244177b5806c7b6b171b1945168f685631b913664
SHA5120b561f651161a34c37ff8d115f154c52202f573d049681f8cdd7bba2e966bb8203780c19ba824b4a693ef12ef1eeef6aeeef96eb369e4b6129f1deb6b26aaa00
-
Filesize
71KB
MD5f95639980a358b2b157af19d8837b3ab
SHA17b6cc1b4916b546d64e9b772f64669ca7ea0c31c
SHA2569edc507023126fe4bb61e301e06897956ce789fd4d985a42210b9b93d4f966cc
SHA51297eeb0f7706ecdbc7b351f1d95f29491bb96b1bdba2e24a16d713977f0f3fc538d55469e1873eaf3551b1707d42c3bbabd6b180971f096d6199a505725e59a16