Analysis
-
max time kernel
112s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exe
Resource
win7-20240903-en
General
-
Target
b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exe
-
Size
368KB
-
MD5
9fe1975d19f4625e8b1dbd6b045bcb0a
-
SHA1
5769f0d9e9da2a3a108e3b546daac5421d8683a9
-
SHA256
b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054
-
SHA512
11a1a494a47a16e63106103930f53719082d2c20a860404166ea0a381c5ed18b3afe27eabbb0930415ac9d1ad69531dcde2d64da292bcfa9b39274e99be89b33
-
SSDEEP
6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4qR:emSuOcHmnYhrDMTrban4qR
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/732-1-0x0000000000D20000-0x0000000000D49000-memory.dmp trickbot_loader32 behavioral2/memory/732-6-0x0000000000D20000-0x0000000000D49000-memory.dmp trickbot_loader32 behavioral2/memory/3508-9-0x0000000001300000-0x0000000001329000-memory.dmp trickbot_loader32 behavioral2/memory/3508-24-0x0000000001300000-0x0000000001329000-memory.dmp trickbot_loader32 behavioral2/memory/8-28-0x0000000000CC0000-0x0000000000CE9000-memory.dmp trickbot_loader32 behavioral2/memory/8-42-0x0000000000CC0000-0x0000000000CE9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exeb8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exepid Process 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exeb8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exeb8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exedescription pid Process Token: SeTcbPrivilege 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exeb8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exeb8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exedescription pid Process procid_target PID 732 wrote to memory of 3508 732 b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exe 83 PID 732 wrote to memory of 3508 732 b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exe 83 PID 732 wrote to memory of 3508 732 b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exe 83 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 3508 wrote to memory of 4988 3508 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 85 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 PID 8 wrote to memory of 4148 8 b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exe"C:\Users\Admin\AppData\Local\Temp\b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Roaming\WNetval\b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exeC:\Users\Admin\AppData\Roaming\WNetval\b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4988
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exeC:\Users\Admin\AppData\Roaming\WNetval\b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1302416131-1437503476-2806442725-1000\0f5007522459c86e95ffcc62f32308f1_acd03e19-89e2-40d7-b0f4-25b8a05635ee
Filesize1KB
MD5529b0d0b15baad94d33e14a6fef68ede
SHA17999fa7693c136f23d3d9f1a931cd57fe89d90c1
SHA256d80a291467d1f479353192b33f5d6b119da30b508da3302cb388c8d769e5e197
SHA512607aa6139e3366d5a617f2f911e540089799c712e5173982ebc155419890560a726266293a578271cc0c4e71993c6f9ebfe18cf56f0ca12e181a03810157fe19
-
C:\Users\Admin\AppData\Roaming\WNetval\b8669d000bdde1f31bafedae092d9a81fd341aa6f6e793b024749c8b94d99064.exe
Filesize368KB
MD59fe1975d19f4625e8b1dbd6b045bcb0a
SHA15769f0d9e9da2a3a108e3b546daac5421d8683a9
SHA256b7559d000bdde1f31bafedae092d8a71fd341aa5f5e683b024649c7b84d88054
SHA51211a1a494a47a16e63106103930f53719082d2c20a860404166ea0a381c5ed18b3afe27eabbb0930415ac9d1ad69531dcde2d64da292bcfa9b39274e99be89b33