Analysis
-
max time kernel
113s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
45f05f43b8f22bd84491034b378f8d60N.exe
Resource
win7-20240903-en
General
-
Target
45f05f43b8f22bd84491034b378f8d60N.exe
-
Size
539KB
-
MD5
45f05f43b8f22bd84491034b378f8d60
-
SHA1
797af8521da5ac17f379d56814380ffe700655ec
-
SHA256
d214ce381a1fd4c3aed996741b6d04468d4afd0c55c900c2cdb673a474acfa7e
-
SHA512
bc7944b6f722c96e4fb43735bc4f88f142db4866d45144718df254a357c9224033e5a8d4e01d40ece41bf300e0fceed86df72b6c951838eca7eb3387872b2fe9
-
SSDEEP
12288:Zx1Q61iHsXYvfVpMODDawkCurdEtttYx/Iw/KiT1O11:ZXQUIsQpMsequrmGx/IwPTW1
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2144-12-0x00000000026C0000-0x00000000026EE000-memory.dmp trickbot_loader32 behavioral2/memory/2144-13-0x0000000002690000-0x00000000026BC000-memory.dmp trickbot_loader32 behavioral2/memory/2144-14-0x00000000026C0000-0x00000000026EE000-memory.dmp trickbot_loader32 behavioral2/memory/2144-17-0x00000000026C0000-0x00000000026EE000-memory.dmp trickbot_loader32 behavioral2/memory/4112-26-0x00000000011C0000-0x00000000011EE000-memory.dmp trickbot_loader32 behavioral2/memory/4112-29-0x00000000011C0000-0x00000000011EE000-memory.dmp trickbot_loader32 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 45f05f43b8f22bd84491034b378f8d60N.exe -
Executes dropped EXE 2 IoCs
pid Process 2144 аНаоすは래별.exe 4112 аНаоすは래별.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45f05f43b8f22bd84491034b378f8d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3656 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2836 45f05f43b8f22bd84491034b378f8d60N.exe 2836 45f05f43b8f22bd84491034b378f8d60N.exe 2144 аНаоすは래별.exe 2144 аНаоすは래별.exe 4112 аНаоすは래별.exe 4112 аНаоすは래별.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2144 2836 45f05f43b8f22bd84491034b378f8d60N.exe 86 PID 2836 wrote to memory of 2144 2836 45f05f43b8f22bd84491034b378f8d60N.exe 86 PID 2836 wrote to memory of 2144 2836 45f05f43b8f22bd84491034b378f8d60N.exe 86 PID 2144 wrote to memory of 3896 2144 аНаоすは래별.exe 91 PID 2144 wrote to memory of 3896 2144 аНаоすは래별.exe 91 PID 2144 wrote to memory of 3896 2144 аНаоすは래별.exe 91 PID 2144 wrote to memory of 3896 2144 аНаоすは래별.exe 91 PID 4112 wrote to memory of 3656 4112 аНаоすは래별.exe 98 PID 4112 wrote to memory of 3656 4112 аНаоすは래별.exe 98 PID 4112 wrote to memory of 3656 4112 аНаоすは래별.exe 98 PID 4112 wrote to memory of 3656 4112 аНаоすは래별.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\45f05f43b8f22bd84491034b378f8d60N.exe"C:\Users\Admin\AppData\Local\Temp\45f05f43b8f22bd84491034b378f8d60N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\ProgramData\аНаоすは래별.exe"C:\ProgramData\аНаоすは래별.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3896
-
-
-
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
539KB
MD545f05f43b8f22bd84491034b378f8d60
SHA1797af8521da5ac17f379d56814380ffe700655ec
SHA256d214ce381a1fd4c3aed996741b6d04468d4afd0c55c900c2cdb673a474acfa7e
SHA512bc7944b6f722c96e4fb43735bc4f88f142db4866d45144718df254a357c9224033e5a8d4e01d40ece41bf300e0fceed86df72b6c951838eca7eb3387872b2fe9