Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23-06-2024 02:49

General

  • Target

    ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe

  • Size

    368KB

  • MD5

    b2571f4a74db8fae5cf8b1e74006de9e

  • SHA1

    796a7827ce134c67929b37e8bcabde467752d207

  • SHA256

    ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640

  • SHA512

    d51528ea62f7de253bc2221f8d582dd32b4a67eaa978b97a07317f000fabb147a881108d52fcb8710f0d19c1443f94259093fd6822b308727ddb431dd5743eb1

  • SSDEEP

    6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4q4:emSuOcHmnYhrDMTrban4q4

Malware Config

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 4 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe
    "C:\Users\Admin\AppData\Local\Temp\ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\SysWOW64\cmd.exe
      /c sc stop WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\SysWOW64\sc.exe
        sc stop WinDefend
        3⤵
        • Launches sc.exe
        PID:2948
    • C:\Windows\SysWOW64\cmd.exe
      /c sc delete WinDefend
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\sc.exe
        sc delete WinDefend
        3⤵
        • Launches sc.exe
        PID:2788
    • C:\Windows\SysWOW64\cmd.exe
      /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Set-MpPreference -DisableRealtimeMonitoring $true
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2744
    • C:\Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe
      C:\Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\SysWOW64\cmd.exe
        /c sc stop WinDefend
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\SysWOW64\sc.exe
          sc stop WinDefend
          4⤵
          • Launches sc.exe
          PID:2632
      • C:\Windows\SysWOW64\cmd.exe
        /c sc delete WinDefend
        3⤵
          PID:2648
          • C:\Windows\SysWOW64\sc.exe
            sc delete WinDefend
            4⤵
            • Launches sc.exe
            PID:2792
        • C:\Windows\SysWOW64\cmd.exe
          /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
          3⤵
            PID:2936
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell Set-MpPreference -DisableRealtimeMonitoring $true
              4⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2516
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe
            3⤵
              PID:2804
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {FB53DA49-3EC4-4616-AF3B-399EC0D07F88} S-1-5-18:NT AUTHORITY\System:Service:
          1⤵
            PID:1316
            • C:\Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe
              C:\Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2360
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe
                3⤵
                  PID:1936

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-481678230-3773327859-3495911762-1000\0f5007522459c86e95ffcc62f32308f1_62d00eb3-39d9-4013-96e4-e92894ec756e

              Filesize

              1KB

              MD5

              27bd62f02c6c594809f6a73aedf5ee54

              SHA1

              ae21043396bdf95b464d83c19cf2ddb910e808d4

              SHA256

              24162d5a2f855a17906d46eec3f3761f63c6b3834ba4fbcb298b1e8e55a41bbb

              SHA512

              b5f24ac165ff8c2b7e3db895d3310c97d20607297632939d43917c26f9e4260134e4384dff0ea714d5260325079df764aee233b2a98d48162c965cf640824a60

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

              Filesize

              7KB

              MD5

              25aa66d1956fe7079a143a8488bafce1

              SHA1

              eb2a5bece2828deb461fe3bf7d5b2f2a9e1c0114

              SHA256

              ba2b520c2626ca01757c616e2a49ed96d012a1d300db146f95712815f91a96fe

              SHA512

              8bb335620874ba3c6c8a8778e029beb562199b4c0919bf9377fbeb0714feb03be63e6bd58616818053a324bc42cac58945baa0e7c20fd04e68b01b7a4dc0cca6

            • \Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe

              Filesize

              368KB

              MD5

              b2571f4a74db8fae5cf8b1e74006de9e

              SHA1

              796a7827ce134c67929b37e8bcabde467752d207

              SHA256

              ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640

              SHA512

              d51528ea62f7de253bc2221f8d582dd32b4a67eaa978b97a07317f000fabb147a881108d52fcb8710f0d19c1443f94259093fd6822b308727ddb431dd5743eb1

            • memory/2284-1-0x0000000000120000-0x0000000000149000-memory.dmp

              Filesize

              164KB

            • memory/2284-7-0x0000000000120000-0x0000000000149000-memory.dmp

              Filesize

              164KB

            • memory/2664-10-0x0000000000270000-0x0000000000299000-memory.dmp

              Filesize

              164KB

            • memory/2664-12-0x0000000010000000-0x0000000010007000-memory.dmp

              Filesize

              28KB

            • memory/2664-21-0x0000000000270000-0x0000000000299000-memory.dmp

              Filesize

              164KB

            • memory/2664-11-0x0000000010000000-0x0000000010007000-memory.dmp

              Filesize

              28KB

            • memory/2804-22-0x0000000000060000-0x0000000000061000-memory.dmp

              Filesize

              4KB

            • memory/2804-16-0x0000000010000000-0x000000001001F000-memory.dmp

              Filesize

              124KB

            • memory/2804-17-0x0000000010000000-0x000000001001F000-memory.dmp

              Filesize

              124KB