Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
FC37F21CE836B982CA136E18953AF2B9219F526833B255A87A3FD5F6C2AFF167.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
FC37F21CE836B982CA136E18953AF2B9219F526833B255A87A3FD5F6C2AFF167.exe
Resource
win10v2004-20240508-en
General
-
Target
FC37F21CE836B982CA136E18953AF2B9219F526833B255A87A3FD5F6C2AFF167.exe
-
Size
348KB
-
MD5
92c5cb082171843f72b15695a79080f7
-
SHA1
8fa46a9f210aaaa3a93e3e93183ff34a59b9055f
-
SHA256
fc37f21ce836b982ca136e18953af2b9219f526833b255a87a3fd5f6c2aff167
-
SHA512
5422b35c174404f9c3fd1037af702b5f4afa1016873ab33e141931cda96e78ef3818ece87f5b76aa8d59416fd98eff7ecf28504e5a420b5898d5a9c3babcc897
-
SSDEEP
6144:rkWQuLNawPczZLIjerLQ/pc9FpTg/yVcCmkj:JJL9kFLIer8/p+zMGfNj
Malware Config
Extracted
trickbot
1000192
jim222
209.121.142.202:449
5.102.177.205:449
209.121.142.214:449
95.161.180.42:449
203.86.222.142:449
109.95.114.28:449
118.91.178.106:449
173.220.6.194:449
179.107.89.145:449
46.20.207.204:449
91.206.4.216:449
69.122.117.95:449
68.96.73.154:449
185.42.192.194:449
189.84.125.37:449
68.227.31.46:449
107.144.49.162:449
46.72.175.17:449
144.48.51.8:449
46.243.179.212:449
191.6.18.166:449
81.177.255.76:449
94.250.251.49:443
80.93.182.51:443
37.230.116.77:443
185.174.172.20:443
82.146.57.73:443
82.146.62.210:443
37.230.112.67:443
80.87.197.152:443
37.230.116.56:443
91.235.129.15:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exepid process 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\wsxmail\GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe = "C:\\Users\\Admin\\AppData\\Roaming\\wsxmail\\GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe" svchost.exe -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 ipecho.net 11 api.ipify.org 12 icanhazip.com 13 myexternalip.com 14 wtfismyip.com 15 ip.anysrc.net 16 checkip.amazonaws.com -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
FC37F21CE836B982CA136E18953AF2B9219F526833B255A87A3FD5F6C2AFF167.exeGD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exedescription pid process target process PID 2840 wrote to memory of 4900 2840 FC37F21CE836B982CA136E18953AF2B9219F526833B255A87A3FD5F6C2AFF167.exe GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe PID 2840 wrote to memory of 4900 2840 FC37F21CE836B982CA136E18953AF2B9219F526833B255A87A3FD5F6C2AFF167.exe GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe PID 2840 wrote to memory of 4900 2840 FC37F21CE836B982CA136E18953AF2B9219F526833B255A87A3FD5F6C2AFF167.exe GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe PID 4900 wrote to memory of 3024 4900 GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FC37F21CE836B982CA136E18953AF2B9219F526833B255A87A3FD5F6C2AFF167.exe"C:\Users\Admin\AppData\Local\Temp\FC37F21CE836B982CA136E18953AF2B9219F526833B255A87A3FD5F6C2AFF167.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\wsxmail\GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exeC:\Users\Admin\AppData\Roaming\wsxmail\GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\wsxmail\GD38G21DF937C992DA137F19963AG2C9219G627933C266A98A3GE6G7D2AGG178.exe
Filesize348KB
MD592c5cb082171843f72b15695a79080f7
SHA18fa46a9f210aaaa3a93e3e93183ff34a59b9055f
SHA256fc37f21ce836b982ca136e18953af2b9219f526833b255a87a3fd5f6c2aff167
SHA5125422b35c174404f9c3fd1037af702b5f4afa1016873ab33e141931cda96e78ef3818ece87f5b76aa8d59416fd98eff7ecf28504e5a420b5898d5a9c3babcc897