Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
7fb1de391d2e8956aab8a707ba7047b0N.exe
Resource
win7-20240705-en
General
-
Target
7fb1de391d2e8956aab8a707ba7047b0N.exe
-
Size
368KB
-
MD5
7fb1de391d2e8956aab8a707ba7047b0
-
SHA1
b4596d683f948181068395159cf245d7faf5617a
-
SHA256
e31ace5602fa7c78e8a7c73efded326053a27ee8b94a868e3487c798803d8f3b
-
SHA512
32b7e4773585434eabc057f3af32c08726bf347bac1a3375b87cff22e1b8498b90821f918047778a7e22add83293dcc08d3ccdb8c74ae0a75616f1cd39153305
-
SSDEEP
6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4q0:emSuOcHmnYhrDMTrban4q0
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/5028-1-0x0000000000B50000-0x0000000000B79000-memory.dmp trickbot_loader32 behavioral2/memory/5028-7-0x0000000000B50000-0x0000000000B79000-memory.dmp trickbot_loader32 behavioral2/memory/380-9-0x0000000000520000-0x0000000000549000-memory.dmp trickbot_loader32 behavioral2/memory/380-24-0x0000000000520000-0x0000000000549000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 380 8fb1de391d2e9967aab9a808ba8048b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fb1de391d2e8956aab8a707ba7047b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8fb1de391d2e9967aab9a808ba8048b0N.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5028 wrote to memory of 380 5028 7fb1de391d2e8956aab8a707ba7047b0N.exe 85 PID 5028 wrote to memory of 380 5028 7fb1de391d2e8956aab8a707ba7047b0N.exe 85 PID 5028 wrote to memory of 380 5028 7fb1de391d2e8956aab8a707ba7047b0N.exe 85 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 PID 380 wrote to memory of 1832 380 8fb1de391d2e9967aab9a808ba8048b0N.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fb1de391d2e8956aab8a707ba7047b0N.exe"C:\Users\Admin\AppData\Local\Temp\7fb1de391d2e8956aab8a707ba7047b0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Roaming\WNetval\8fb1de391d2e9967aab9a808ba8048b0N.exeC:\Users\Admin\AppData\Roaming\WNetval\8fb1de391d2e9967aab9a808ba8048b0N.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-523280732-2327480845-3730041215-1000\0f5007522459c86e95ffcc62f32308f1_a5c5e2ae-85e3-447c-9e0b-c9a7b966d823
Filesize1KB
MD548071fd142bef6a258e8800a97c8a273
SHA1a6fa396d63054c3a375bf20116b1e74601dbde4c
SHA256c87f76466f28f616437def638fbb67cfba7c78227b124ede48ce0eef1041d6c4
SHA512f099f8695c0f2050bc18165b77025955086219c47d68e106ecb1027c173c7eb27b22c21021a075b9fcaff1cc781e2ee98f326bd02af6bb5d98788dfb0ba8d06a
-
Filesize
368KB
MD57fb1de391d2e8956aab8a707ba7047b0
SHA1b4596d683f948181068395159cf245d7faf5617a
SHA256e31ace5602fa7c78e8a7c73efded326053a27ee8b94a868e3487c798803d8f3b
SHA51232b7e4773585434eabc057f3af32c08726bf347bac1a3375b87cff22e1b8498b90821f918047778a7e22add83293dcc08d3ccdb8c74ae0a75616f1cd39153305