Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    112s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 04:22 UTC

General

  • Target

    df5215bdcbdfaccab02351af4429c1e0N.exe

  • Size

    368KB

  • MD5

    df5215bdcbdfaccab02351af4429c1e0

  • SHA1

    fa4be0ebc366a12593ead91051f700e0e747159e

  • SHA256

    52663735bcdbfc92faf78d1c51e7447b9ee5e0d49db381a40a72b66c1e68c1f4

  • SHA512

    911190558b103c2daece159318dff2a788845e318d1ab4484e5890a9c258726fdc93919f79f3c1c05cedaf965abc36d38b50dbcd2775d281e2c27526e96795d4

  • SSDEEP

    6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4qQ:emSuOcHmnYhrDMTrban4qQ

Malware Config

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 6 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Executes dropped EXE 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\df5215bdcbdfaccab02351af4429c1e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\df5215bdcbdfaccab02351af4429c1e0N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Roaming\WNetval\df6216bdcbdfaccab02361af4429c1e0N.exe
      C:\Users\Admin\AppData\Roaming\WNetval\df6216bdcbdfaccab02361af4429c1e0N.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:4184
    • C:\Users\Admin\AppData\Roaming\WNetval\df6216bdcbdfaccab02361af4429c1e0N.exe
      C:\Users\Admin\AppData\Roaming\WNetval\df6216bdcbdfaccab02361af4429c1e0N.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        2⤵
          PID:3296

      Network

      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        97.17.167.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        97.17.167.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.214.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.214.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        95.221.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        95.221.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        86.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        86.23.85.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        15.164.165.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        15.164.165.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.134.221.88.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.134.221.88.in-addr.arpa
        IN PTR
        Response
        18.134.221.88.in-addr.arpa
        IN PTR
        a88-221-134-18deploystaticakamaitechnologiescom
      • flag-us
        DNS
        81.144.22.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        81.144.22.2.in-addr.arpa
        IN PTR
        Response
        81.144.22.2.in-addr.arpa
        IN PTR
        a2-22-144-81deploystaticakamaitechnologiescom
      • flag-us
        DNS
        48.229.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        48.229.111.52.in-addr.arpa
        IN PTR
        Response
      • 125.209.82.158:449
        svchost.exe
        260 B
        5
      • 125.209.82.158:449
        svchost.exe
        208 B
        4
      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        97.17.167.52.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        97.17.167.52.in-addr.arpa

      • 8.8.8.8:53
        172.214.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.214.232.199.in-addr.arpa

      • 8.8.8.8:53
        95.221.229.192.in-addr.arpa
        dns
        73 B
        144 B
        1
        1

        DNS Request

        95.221.229.192.in-addr.arpa

      • 8.8.8.8:53
        86.23.85.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        86.23.85.13.in-addr.arpa

      • 8.8.8.8:53
        15.164.165.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        15.164.165.52.in-addr.arpa

      • 8.8.8.8:53
        18.134.221.88.in-addr.arpa
        dns
        72 B
        137 B
        1
        1

        DNS Request

        18.134.221.88.in-addr.arpa

      • 8.8.8.8:53
        81.144.22.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        81.144.22.2.in-addr.arpa

      • 8.8.8.8:53
        48.229.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        48.229.111.52.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2392887640-1187051047-2909758433-1000\0f5007522459c86e95ffcc62f32308f1_c186ecc3-67e4-4d2b-8682-b6c322da87aa

        Filesize

        1KB

        MD5

        ec121bcb792a6f393aebbdad8753cb50

        SHA1

        10e9c186dfdc7861695aa029026b60fa4c04a624

        SHA256

        5cef0524ca7c19ec37f00e20a7ab838dbc7f72cc9e75640194ad5623cd227bfc

        SHA512

        f0d19560e46dbca896df0c153412c2e0b31ce4ce5481253c8d9ace4201e68d6e90af9719ecc94c168b61e81d867ddd108a32d22e6f3b144a7afdd79bdb16b821

      • C:\Users\Admin\AppData\Roaming\WNetval\df6216bdcbdfaccab02361af4429c1e0N.exe

        Filesize

        368KB

        MD5

        df5215bdcbdfaccab02351af4429c1e0

        SHA1

        fa4be0ebc366a12593ead91051f700e0e747159e

        SHA256

        52663735bcdbfc92faf78d1c51e7447b9ee5e0d49db381a40a72b66c1e68c1f4

        SHA512

        911190558b103c2daece159318dff2a788845e318d1ab4484e5890a9c258726fdc93919f79f3c1c05cedaf965abc36d38b50dbcd2775d281e2c27526e96795d4

      • memory/1524-42-0x00000000016C0000-0x00000000016E9000-memory.dmp

        Filesize

        164KB

      • memory/1524-41-0x00000000020D0000-0x0000000002399000-memory.dmp

        Filesize

        2.8MB

      • memory/1524-40-0x0000000002010000-0x00000000020CE000-memory.dmp

        Filesize

        760KB

      • memory/1524-34-0x0000000001720000-0x0000000001721000-memory.dmp

        Filesize

        4KB

      • memory/1524-28-0x00000000016C0000-0x00000000016E9000-memory.dmp

        Filesize

        164KB

      • memory/3296-44-0x0000000010000000-0x000000001001F000-memory.dmp

        Filesize

        124KB

      • memory/4184-18-0x0000000010000000-0x000000001001F000-memory.dmp

        Filesize

        124KB

      • memory/4184-17-0x0000023B17DD0000-0x0000023B17DD1000-memory.dmp

        Filesize

        4KB

      • memory/4276-24-0x0000000000910000-0x0000000000939000-memory.dmp

        Filesize

        164KB

      • memory/4276-22-0x00000000025F0000-0x00000000026AE000-memory.dmp

        Filesize

        760KB

      • memory/4276-23-0x00000000026B0000-0x0000000002979000-memory.dmp

        Filesize

        2.8MB

      • memory/4276-15-0x00000000009B0000-0x00000000009B1000-memory.dmp

        Filesize

        4KB

      • memory/4276-11-0x0000000010000000-0x0000000010007000-memory.dmp

        Filesize

        28KB

      • memory/4276-10-0x0000000010000000-0x0000000010007000-memory.dmp

        Filesize

        28KB

      • memory/4276-9-0x0000000000910000-0x0000000000939000-memory.dmp

        Filesize

        164KB

      • memory/4804-1-0x00000000010C0000-0x00000000010E9000-memory.dmp

        Filesize

        164KB

      • memory/4804-8-0x00000000010C0000-0x00000000010E9000-memory.dmp

        Filesize

        164KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.