Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 02:49
Static task
static1
Behavioral task
behavioral1
Sample
ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe
Resource
win7-20240419-en
General
-
Target
ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe
-
Size
368KB
-
MD5
b2571f4a74db8fae5cf8b1e74006de9e
-
SHA1
796a7827ce134c67929b37e8bcabde467752d207
-
SHA256
ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640
-
SHA512
d51528ea62f7de253bc2221f8d582dd32b4a67eaa978b97a07317f000fabb147a881108d52fcb8710f0d19c1443f94259093fd6822b308727ddb431dd5743eb1
-
SSDEEP
6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4q4:emSuOcHmnYhrDMTrban4q4
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/1644-1-0x0000000001080000-0x00000000010A9000-memory.dmp trickbot_loader32 behavioral2/memory/1644-5-0x0000000001080000-0x00000000010A9000-memory.dmp trickbot_loader32 behavioral2/memory/744-9-0x0000000000B70000-0x0000000000B99000-memory.dmp trickbot_loader32 behavioral2/memory/744-24-0x0000000000B70000-0x0000000000B99000-memory.dmp trickbot_loader32 behavioral2/memory/3744-28-0x0000000000C80000-0x0000000000CA9000-memory.dmp trickbot_loader32 behavioral2/memory/3744-42-0x0000000000C80000-0x0000000000CA9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1644 wrote to memory of 744 1644 ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe 80 PID 1644 wrote to memory of 744 1644 ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe 80 PID 1644 wrote to memory of 744 1644 ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe 80 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 744 wrote to memory of 3612 744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 81 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 PID 3744 wrote to memory of 2380 3744 ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe"C:\Users\Admin\AppData\Local\Temp\ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exeC:\Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3612
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exeC:\Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2539840389-1261165778-1087677076-1000\0f5007522459c86e95ffcc62f32308f1_468f6343-c0e6-4931-9703-30c6539573cb
Filesize1KB
MD510cc0d3ddbad5b3b63c11b890d9bdc8a
SHA1c46fd617ee491fb562cc44885ca904b573b01efd
SHA2565bfb63d32dc841169554974f13bf47fdbcd98d23fe55db68b79e700b2f2b3cb6
SHA5128a0a93fa04b33bf34369af1a4c8f3ad417db1a3b236c537a38d8d93a81ee13b20d04afbbb7c7997e039479fa01c97b0e9328d40f15de7a51edeac011845b71b5
-
C:\Users\Admin\AppData\Roaming\WNetval\ba68499993e7bb9ffc9730cd91d904c83e671196d0c3130a0cf67b998276f740.exe
Filesize368KB
MD5b2571f4a74db8fae5cf8b1e74006de9e
SHA1796a7827ce134c67929b37e8bcabde467752d207
SHA256ba57489883e6bb8ffc9630cd81d904c73e561185d0c3130a0cf56b887265f640
SHA512d51528ea62f7de253bc2221f8d582dd32b4a67eaa978b97a07317f000fabb147a881108d52fcb8710f0d19c1443f94259093fd6822b308727ddb431dd5743eb1