Analysis
-
max time kernel
71s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
341f2b740c789f54c4dee43c874dae50N.exe
Resource
win7-20240903-en
General
-
Target
341f2b740c789f54c4dee43c874dae50N.exe
-
Size
517KB
-
MD5
341f2b740c789f54c4dee43c874dae50
-
SHA1
8c65f54694997784edcf527cd53e6b8c95d23073
-
SHA256
4edc0727d011e67b65e9522f007d00d8485f75129c0990dffd90e997772be9c5
-
SHA512
385f18f4d206c2c5dff56f00d470df8d8d88ec798a4a686f91eae43aacdc5e5a92441cd7bcc79dbbc0fc6347754a2c05b850125dc48bdd3b7a17b8da5b302855
-
SSDEEP
12288:Zx1Q61iHsXYvfVpMODDawkCurdEtttYrhK+sf+p:ZXQUIsQpMsequrmGrMs
Malware Config
Signatures
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2800-11-0x0000000000380000-0x00000000003AC000-memory.dmp trickbot_loader32 behavioral1/memory/2800-10-0x00000000003B0000-0x00000000003DE000-memory.dmp trickbot_loader32 behavioral1/memory/2800-13-0x00000000003B0000-0x00000000003DE000-memory.dmp trickbot_loader32 behavioral1/memory/2800-16-0x00000000003B0000-0x00000000003DE000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 2800 аНаоすは래별.exe 1928 аНаоすは래별.exe -
Loads dropped DLL 2 IoCs
pid Process 2472 341f2b740c789f54c4dee43c874dae50N.exe 2472 341f2b740c789f54c4dee43c874dae50N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 341f2b740c789f54c4dee43c874dae50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2168 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 341f2b740c789f54c4dee43c874dae50N.exe 2472 341f2b740c789f54c4dee43c874dae50N.exe 2800 аНаоすは래별.exe 2800 аНаоすは래별.exe 1928 аНаоすは래별.exe 1928 аНаоすは래별.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2800 2472 341f2b740c789f54c4dee43c874dae50N.exe 30 PID 2472 wrote to memory of 2800 2472 341f2b740c789f54c4dee43c874dae50N.exe 30 PID 2472 wrote to memory of 2800 2472 341f2b740c789f54c4dee43c874dae50N.exe 30 PID 2472 wrote to memory of 2800 2472 341f2b740c789f54c4dee43c874dae50N.exe 30 PID 2800 wrote to memory of 3024 2800 аНаоすは래별.exe 31 PID 2800 wrote to memory of 3024 2800 аНаоすは래별.exe 31 PID 2800 wrote to memory of 3024 2800 аНаоすは래별.exe 31 PID 2800 wrote to memory of 3024 2800 аНаоすは래별.exe 31 PID 2800 wrote to memory of 3024 2800 аНаоすは래별.exe 31 PID 2800 wrote to memory of 3024 2800 аНаоすは래별.exe 31 PID 2516 wrote to memory of 1928 2516 taskeng.exe 34 PID 2516 wrote to memory of 1928 2516 taskeng.exe 34 PID 2516 wrote to memory of 1928 2516 taskeng.exe 34 PID 2516 wrote to memory of 1928 2516 taskeng.exe 34 PID 1928 wrote to memory of 2168 1928 аНаоすは래별.exe 35 PID 1928 wrote to memory of 2168 1928 аНаоすは래별.exe 35 PID 1928 wrote to memory of 2168 1928 аНаоすは래별.exe 35 PID 1928 wrote to memory of 2168 1928 аНаоすは래별.exe 35 PID 1928 wrote to memory of 2168 1928 аНаоすは래별.exe 35 PID 1928 wrote to memory of 2168 1928 аНаоすは래별.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\341f2b740c789f54c4dee43c874dae50N.exe"C:\Users\Admin\AppData\Local\Temp\341f2b740c789f54c4dee43c874dae50N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\ProgramData\аНаоすは래별.exe"C:\ProgramData\аНаоすは래별.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:3024
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {835ECA9D-1C8F-4D82-B24E-511C17249393} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5341f2b740c789f54c4dee43c874dae50
SHA18c65f54694997784edcf527cd53e6b8c95d23073
SHA2564edc0727d011e67b65e9522f007d00d8485f75129c0990dffd90e997772be9c5
SHA512385f18f4d206c2c5dff56f00d470df8d8d88ec798a4a686f91eae43aacdc5e5a92441cd7bcc79dbbc0fc6347754a2c05b850125dc48bdd3b7a17b8da5b302855