Analysis
-
max time kernel
113s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
341f2b740c789f54c4dee43c874dae50N.exe
Resource
win7-20240903-en
General
-
Target
341f2b740c789f54c4dee43c874dae50N.exe
-
Size
517KB
-
MD5
341f2b740c789f54c4dee43c874dae50
-
SHA1
8c65f54694997784edcf527cd53e6b8c95d23073
-
SHA256
4edc0727d011e67b65e9522f007d00d8485f75129c0990dffd90e997772be9c5
-
SHA512
385f18f4d206c2c5dff56f00d470df8d8d88ec798a4a686f91eae43aacdc5e5a92441cd7bcc79dbbc0fc6347754a2c05b850125dc48bdd3b7a17b8da5b302855
-
SSDEEP
12288:Zx1Q61iHsXYvfVpMODDawkCurdEtttYrhK+sf+p:ZXQUIsQpMsequrmGrMs
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4832-11-0x0000000002330000-0x000000000235E000-memory.dmp trickbot_loader32 behavioral2/memory/4832-14-0x0000000002330000-0x000000000235E000-memory.dmp trickbot_loader32 behavioral2/memory/4832-13-0x00000000021E0000-0x000000000220C000-memory.dmp trickbot_loader32 behavioral2/memory/4832-18-0x0000000002330000-0x000000000235E000-memory.dmp trickbot_loader32 behavioral2/memory/4076-26-0x00000000011C0000-0x00000000011EE000-memory.dmp trickbot_loader32 behavioral2/memory/4076-29-0x00000000011C0000-0x00000000011EE000-memory.dmp trickbot_loader32 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
341f2b740c789f54c4dee43c874dae50N.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 341f2b740c789f54c4dee43c874dae50N.exe -
Executes dropped EXE 2 IoCs
Processes:
аНаоすは래별.exeаНаоすは래별.exepid Process 4832 аНаоすは래별.exe 4076 аНаоすは래별.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
341f2b740c789f54c4dee43c874dae50N.exeаНаоすは래별.exeаНаоすは래별.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 341f2b740c789f54c4dee43c874dae50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid Process Token: SeTcbPrivilege 4272 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
341f2b740c789f54c4dee43c874dae50N.exeаНаоすは래별.exeаНаоすは래별.exepid Process 5112 341f2b740c789f54c4dee43c874dae50N.exe 5112 341f2b740c789f54c4dee43c874dae50N.exe 4832 аНаоすは래별.exe 4832 аНаоすは래별.exe 4076 аНаоすは래별.exe 4076 аНаоすは래별.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
341f2b740c789f54c4dee43c874dae50N.exeаНаоすは래별.exeаНаоすは래별.exedescription pid Process procid_target PID 5112 wrote to memory of 4832 5112 341f2b740c789f54c4dee43c874dae50N.exe 84 PID 5112 wrote to memory of 4832 5112 341f2b740c789f54c4dee43c874dae50N.exe 84 PID 5112 wrote to memory of 4832 5112 341f2b740c789f54c4dee43c874dae50N.exe 84 PID 4832 wrote to memory of 4048 4832 аНаоすは래별.exe 88 PID 4832 wrote to memory of 4048 4832 аНаоすは래별.exe 88 PID 4832 wrote to memory of 4048 4832 аНаоすは래별.exe 88 PID 4832 wrote to memory of 4048 4832 аНаоすは래별.exe 88 PID 4076 wrote to memory of 4272 4076 аНаоすは래별.exe 99 PID 4076 wrote to memory of 4272 4076 аНаоすは래별.exe 99 PID 4076 wrote to memory of 4272 4076 аНаоすは래별.exe 99 PID 4076 wrote to memory of 4272 4076 аНаоすは래별.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\341f2b740c789f54c4dee43c874dae50N.exe"C:\Users\Admin\AppData\Local\Temp\341f2b740c789f54c4dee43c874dae50N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\ProgramData\аНаоすは래별.exe"C:\ProgramData\аНаоすは래별.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4048
-
-
-
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5341f2b740c789f54c4dee43c874dae50
SHA18c65f54694997784edcf527cd53e6b8c95d23073
SHA2564edc0727d011e67b65e9522f007d00d8485f75129c0990dffd90e997772be9c5
SHA512385f18f4d206c2c5dff56f00d470df8d8d88ec798a4a686f91eae43aacdc5e5a92441cd7bcc79dbbc0fc6347754a2c05b850125dc48bdd3b7a17b8da5b302855