Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
Trusteer.exe
Resource
win7-20240704-en
General
-
Target
Trusteer.exe
-
Size
3.3MB
-
MD5
30cb49e14aa0f3247110df5dc1a1690b
-
SHA1
84521809033b25b01338e3087881d4c37b4d0faa
-
SHA256
2ad801c4a4f232b02c940858d69c3d3608c6df1606b73c76494e1d7d0d30e761
-
SHA512
c206045d0c2ba0dfc773bb5b41db0802127d86d521b6fe41523d63e59b79a2657dd960b3ca1dc1be31298279d920f3080a5e72803cd11fe261b32e08cd3577e9
-
SSDEEP
49152:p7RUQh1V1fO/9DA0q3i9aLrsvHyR15U8dJAsgWpyTulz9b9H5vDCjeMeZi7uax:p711TMeS92r1155A/0ysPZvej3
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Trusteer.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Trusteer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Trusteer.exe -
Executes dropped EXE 1 IoCs
pid Process 2876 GetX64BTIT.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Wine Trusteer.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 api.ipify.org 46 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4848 Trusteer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4848 set thread context of 368 4848 Trusteer.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trusteer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Trusteer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4848 Trusteer.exe 4848 Trusteer.exe 4848 Trusteer.exe 4848 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe 368 Trusteer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 368 Trusteer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 4848 wrote to memory of 368 4848 Trusteer.exe 104 PID 368 wrote to memory of 2876 368 Trusteer.exe 105 PID 368 wrote to memory of 2876 368 Trusteer.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"C:\Users\Admin\AppData\Local\Temp\Trusteer.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"3⤵
- Executes dropped EXE
PID:2876
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4396,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=1288 /prefetch:81⤵PID:740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD503d40b023a868844d00145bc7e131bae
SHA16280b59cbf7c12f0b40b330e07d9be87a9c62d88
SHA256cdeec18bd07a0b8b7c62d9b34e0c78d2795206854320f8f31aa0325d048051d1
SHA512bb7a2030a4e14a824bfeccff95635c84966e93f06762115ea4c7b046a148fe243b0a0155cd59bbfacf6c4f8cdf24a1030d1170a95cd63df3632c1cbca3325d30