Analysis
-
max time kernel
129s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe
Resource
win7-20240704-en
General
-
Target
295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe
-
Size
355KB
-
MD5
2b1818fba14402d5592ac9b827e0daec
-
SHA1
b1fa488e0b4bc4dc7822c12fc652e5af6d6b82c3
-
SHA256
295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353
-
SHA512
28296a95b6655dc76fb6d1e062b23e9927fe7fa0291139f97b2e46ec20787a5980f0ea8a63e128929df1c9c251e3080086ed9703f3c395dae42283c60019e9e2
-
SSDEEP
6144:O/GIHY9EPzb0dT83QOATmTygzda6tt4jQIPUZnq3BN5f68Gv5IO2:O/GmPzwOATSy8da6r4j5Cef6Z
Malware Config
Extracted
trickbot
1000139
tt0002
212.14.51.43:449
212.14.51.56:449
78.155.199.232:443
95.213.195.46:443
82.202.204.9:443
82.202.236.101:443
195.133.146.92:443
194.87.94.8:443
92.53.91.252:443
185.228.233.174:443
81.177.141.197:443
81.177.141.7:443
185.236.130.10:443
94.250.250.216:443
109.234.38.22:443
82.202.204.172:443
81.177.135.225:443
94.250.252.228:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\TeamViewer\ = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\TeamViewer\ = "0" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 2864 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 icanhazip.com -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2996 svchost.exe Token: SeTcbPrivilege 2864 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2716 295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2716 wrote to memory of 1600 2716 295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe 31 PID 2716 wrote to memory of 1600 2716 295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe 31 PID 2716 wrote to memory of 1600 2716 295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe 31 PID 2716 wrote to memory of 1600 2716 295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe 31 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 PID 1600 wrote to memory of 2996 1600 296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe"C:\Users\Admin\AppData\Local\Temp\295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\TeamViewer\296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exeC:\Users\Admin\AppData\Roaming\TeamViewer\296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
- Windows security bypass
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9BD1F4C1-B1C1-4CB5-B364-66072CF483FE} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:676
-
C:\Users\Admin\AppData\Roaming\TeamViewer\296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exeC:\Users\Admin\AppData\Roaming\TeamViewer\296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2864 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵
- Windows security bypass
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\TeamViewer\296984610bc07126847ae9ffcea36828212e9091d4eb6e2bb99bc79678989363.exe
Filesize355KB
MD52b1818fba14402d5592ac9b827e0daec
SHA1b1fa488e0b4bc4dc7822c12fc652e5af6d6b82c3
SHA256295874510bc06125746ae8ffcea35727212e9091d4eb5e2bb99bc69567879353
SHA51228296a95b6655dc76fb6d1e062b23e9927fe7fa0291139f97b2e46ec20787a5980f0ea8a63e128929df1c9c251e3080086ed9703f3c395dae42283c60019e9e2