Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 04:22
Static task
static1
Behavioral task
behavioral1
Sample
df5215bdcbdfaccab02351af4429c1e0N.exe
Resource
win7-20240708-en
General
-
Target
df5215bdcbdfaccab02351af4429c1e0N.exe
-
Size
368KB
-
MD5
df5215bdcbdfaccab02351af4429c1e0
-
SHA1
fa4be0ebc366a12593ead91051f700e0e747159e
-
SHA256
52663735bcdbfc92faf78d1c51e7447b9ee5e0d49db381a40a72b66c1e68c1f4
-
SHA512
911190558b103c2daece159318dff2a788845e318d1ab4484e5890a9c258726fdc93919f79f3c1c05cedaf965abc36d38b50dbcd2775d281e2c27526e96795d4
-
SSDEEP
6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4qQ:emSuOcHmnYhrDMTrban4qQ
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4804-1-0x00000000010C0000-0x00000000010E9000-memory.dmp trickbot_loader32 behavioral2/memory/4804-8-0x00000000010C0000-0x00000000010E9000-memory.dmp trickbot_loader32 behavioral2/memory/4276-9-0x0000000000910000-0x0000000000939000-memory.dmp trickbot_loader32 behavioral2/memory/4276-24-0x0000000000910000-0x0000000000939000-memory.dmp trickbot_loader32 behavioral2/memory/1524-28-0x00000000016C0000-0x00000000016E9000-memory.dmp trickbot_loader32 behavioral2/memory/1524-42-0x00000000016C0000-0x00000000016E9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
df6216bdcbdfaccab02361af4429c1e0N.exedf6216bdcbdfaccab02361af4429c1e0N.exepid Process 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 1524 df6216bdcbdfaccab02361af4429c1e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
df5215bdcbdfaccab02351af4429c1e0N.exedf6216bdcbdfaccab02361af4429c1e0N.exedf6216bdcbdfaccab02361af4429c1e0N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df5215bdcbdfaccab02351af4429c1e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df6216bdcbdfaccab02361af4429c1e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df6216bdcbdfaccab02361af4429c1e0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
df6216bdcbdfaccab02361af4429c1e0N.exedescription pid Process Token: SeTcbPrivilege 1524 df6216bdcbdfaccab02361af4429c1e0N.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
df5215bdcbdfaccab02351af4429c1e0N.exedf6216bdcbdfaccab02361af4429c1e0N.exedf6216bdcbdfaccab02361af4429c1e0N.exedescription pid Process procid_target PID 4804 wrote to memory of 4276 4804 df5215bdcbdfaccab02351af4429c1e0N.exe 84 PID 4804 wrote to memory of 4276 4804 df5215bdcbdfaccab02351af4429c1e0N.exe 84 PID 4804 wrote to memory of 4276 4804 df5215bdcbdfaccab02351af4429c1e0N.exe 84 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 4276 wrote to memory of 4184 4276 df6216bdcbdfaccab02361af4429c1e0N.exe 86 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 PID 1524 wrote to memory of 3296 1524 df6216bdcbdfaccab02361af4429c1e0N.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\df5215bdcbdfaccab02351af4429c1e0N.exe"C:\Users\Admin\AppData\Local\Temp\df5215bdcbdfaccab02351af4429c1e0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Roaming\WNetval\df6216bdcbdfaccab02361af4429c1e0N.exeC:\Users\Admin\AppData\Roaming\WNetval\df6216bdcbdfaccab02361af4429c1e0N.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4184
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\df6216bdcbdfaccab02361af4429c1e0N.exeC:\Users\Admin\AppData\Roaming\WNetval\df6216bdcbdfaccab02361af4429c1e0N.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:3296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2392887640-1187051047-2909758433-1000\0f5007522459c86e95ffcc62f32308f1_c186ecc3-67e4-4d2b-8682-b6c322da87aa
Filesize1KB
MD5ec121bcb792a6f393aebbdad8753cb50
SHA110e9c186dfdc7861695aa029026b60fa4c04a624
SHA2565cef0524ca7c19ec37f00e20a7ab838dbc7f72cc9e75640194ad5623cd227bfc
SHA512f0d19560e46dbca896df0c153412c2e0b31ce4ce5481253c8d9ace4201e68d6e90af9719ecc94c168b61e81d867ddd108a32d22e6f3b144a7afdd79bdb16b821
-
Filesize
368KB
MD5df5215bdcbdfaccab02351af4429c1e0
SHA1fa4be0ebc366a12593ead91051f700e0e747159e
SHA25652663735bcdbfc92faf78d1c51e7447b9ee5e0d49db381a40a72b66c1e68c1f4
SHA512911190558b103c2daece159318dff2a788845e318d1ab4484e5890a9c258726fdc93919f79f3c1c05cedaf965abc36d38b50dbcd2775d281e2c27526e96795d4