Analysis
-
max time kernel
76s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
45f05f43b8f22bd84491034b378f8d60N.exe
Resource
win7-20240903-en
General
-
Target
45f05f43b8f22bd84491034b378f8d60N.exe
-
Size
539KB
-
MD5
45f05f43b8f22bd84491034b378f8d60
-
SHA1
797af8521da5ac17f379d56814380ffe700655ec
-
SHA256
d214ce381a1fd4c3aed996741b6d04468d4afd0c55c900c2cdb673a474acfa7e
-
SHA512
bc7944b6f722c96e4fb43735bc4f88f142db4866d45144718df254a357c9224033e5a8d4e01d40ece41bf300e0fceed86df72b6c951838eca7eb3387872b2fe9
-
SSDEEP
12288:Zx1Q61iHsXYvfVpMODDawkCurdEtttYx/Iw/KiT1O11:ZXQUIsQpMsequrmGx/IwPTW1
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/540-13-0x00000000003A0000-0x00000000003CE000-memory.dmp trickbot_loader32 behavioral1/memory/540-12-0x0000000000370000-0x000000000039C000-memory.dmp trickbot_loader32 behavioral1/memory/540-10-0x00000000003A0000-0x00000000003CE000-memory.dmp trickbot_loader32 behavioral1/memory/540-16-0x00000000003A0000-0x00000000003CE000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 540 аНаоすは래별.exe 2568 аНаоすは래별.exe -
Loads dropped DLL 2 IoCs
pid Process 2848 45f05f43b8f22bd84491034b378f8d60N.exe 2848 45f05f43b8f22bd84491034b378f8d60N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45f05f43b8f22bd84491034b378f8d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2220 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 45f05f43b8f22bd84491034b378f8d60N.exe 2848 45f05f43b8f22bd84491034b378f8d60N.exe 540 аНаоすは래별.exe 540 аНаоすは래별.exe 2568 аНаоすは래별.exe 2568 аНаоすは래별.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2848 wrote to memory of 540 2848 45f05f43b8f22bd84491034b378f8d60N.exe 31 PID 2848 wrote to memory of 540 2848 45f05f43b8f22bd84491034b378f8d60N.exe 31 PID 2848 wrote to memory of 540 2848 45f05f43b8f22bd84491034b378f8d60N.exe 31 PID 2848 wrote to memory of 540 2848 45f05f43b8f22bd84491034b378f8d60N.exe 31 PID 540 wrote to memory of 572 540 аНаоすは래별.exe 32 PID 540 wrote to memory of 572 540 аНаоすは래별.exe 32 PID 540 wrote to memory of 572 540 аНаоすは래별.exe 32 PID 540 wrote to memory of 572 540 аНаоすは래별.exe 32 PID 540 wrote to memory of 572 540 аНаоすは래별.exe 32 PID 540 wrote to memory of 572 540 аНаоすは래별.exe 32 PID 2664 wrote to memory of 2568 2664 taskeng.exe 34 PID 2664 wrote to memory of 2568 2664 taskeng.exe 34 PID 2664 wrote to memory of 2568 2664 taskeng.exe 34 PID 2664 wrote to memory of 2568 2664 taskeng.exe 34 PID 2568 wrote to memory of 2220 2568 аНаоすは래별.exe 35 PID 2568 wrote to memory of 2220 2568 аНаоすは래별.exe 35 PID 2568 wrote to memory of 2220 2568 аНаоすは래별.exe 35 PID 2568 wrote to memory of 2220 2568 аНаоすは래별.exe 35 PID 2568 wrote to memory of 2220 2568 аНаоすは래별.exe 35 PID 2568 wrote to memory of 2220 2568 аНаоすは래별.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\45f05f43b8f22bd84491034b378f8d60N.exe"C:\Users\Admin\AppData\Local\Temp\45f05f43b8f22bd84491034b378f8d60N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\ProgramData\аНаоすは래별.exe"C:\ProgramData\аНаоすは래별.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:572
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {1FFEB7E3-9514-4666-9859-EFEB28FA3E97} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539KB
MD545f05f43b8f22bd84491034b378f8d60
SHA1797af8521da5ac17f379d56814380ffe700655ec
SHA256d214ce381a1fd4c3aed996741b6d04468d4afd0c55c900c2cdb673a474acfa7e
SHA512bc7944b6f722c96e4fb43735bc4f88f142db4866d45144718df254a357c9224033e5a8d4e01d40ece41bf300e0fceed86df72b6c951838eca7eb3387872b2fe9