Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
Trusteer.exe
Resource
win7-20240704-en
General
-
Target
Trusteer.exe
-
Size
3.3MB
-
MD5
30cb49e14aa0f3247110df5dc1a1690b
-
SHA1
84521809033b25b01338e3087881d4c37b4d0faa
-
SHA256
2ad801c4a4f232b02c940858d69c3d3608c6df1606b73c76494e1d7d0d30e761
-
SHA512
c206045d0c2ba0dfc773bb5b41db0802127d86d521b6fe41523d63e59b79a2657dd960b3ca1dc1be31298279d920f3080a5e72803cd11fe261b32e08cd3577e9
-
SSDEEP
49152:p7RUQh1V1fO/9DA0q3i9aLrsvHyR15U8dJAsgWpyTulz9b9H5vDCjeMeZi7uax:p711TMeS92r1155A/0ysPZvej3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trusteer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trusteer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trusteer.exe -
Executes dropped EXE 1 IoCs
pid Process 112 GetX64BTIT.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Wine Trusteer.exe -
Loads dropped DLL 1 IoCs
pid Process 2284 Trusteer.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1628 Trusteer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1628 set thread context of 2284 1628 Trusteer.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trusteer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trusteer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1628 Trusteer.exe 1628 Trusteer.exe 1628 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe 2284 Trusteer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2284 Trusteer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 1628 wrote to memory of 2284 1628 Trusteer.exe 30 PID 2284 wrote to memory of 112 2284 Trusteer.exe 31 PID 2284 wrote to memory of 112 2284 Trusteer.exe 31 PID 2284 wrote to memory of 112 2284 Trusteer.exe 31 PID 2284 wrote to memory of 112 2284 Trusteer.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"3⤵
- Executes dropped EXE
PID:112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD546d416fc121efc10c5720c44116de087
SHA1d7eb926ca18f6f314eee25d31bce6237dd746119
SHA256bec066549ee9e85b3e045eb9c5bf568f3667029daa2f13a6a5e4b8e1257272e9
SHA5129c03520cadd85b750c864532de35f387077e316a57eb0d1b6fcdbc71f11cbb0d76208acb63a95b8a775a02b709b81025404068b55c772651b3ad07b71c775005