Analysis
-
max time kernel
113s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
b4e2db7927219c5a8a6de22e7a159f40N.exe
Resource
win7-20240708-en
General
-
Target
b4e2db7927219c5a8a6de22e7a159f40N.exe
-
Size
558KB
-
MD5
b4e2db7927219c5a8a6de22e7a159f40
-
SHA1
42e7205f35ffa5311208867cc3ac563d0c6874af
-
SHA256
cd0a125a6af8b014b593281246a0dad433934beaa5a751e8179eb4796ae2f4e2
-
SHA512
bc9a8d85de090618d4abc89231828d7aee247f75b0e2971bed579add7445d6fc42777bb5aaed035817f77e8728990aa791636298176cac425ff3f6f580166201
-
SSDEEP
12288:Zx1Q61iHsXYvfVpMODDawkCurdEtttYGwO7UPdYBMoD:ZXQUIsQpMsequrmGGwO4C2oD
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3984-14-0x0000000002330000-0x000000000235E000-memory.dmp trickbot_loader32 behavioral2/memory/3984-13-0x00000000021F0000-0x000000000221C000-memory.dmp trickbot_loader32 behavioral2/memory/3984-11-0x0000000002330000-0x000000000235E000-memory.dmp trickbot_loader32 behavioral2/memory/3984-17-0x0000000002330000-0x000000000235E000-memory.dmp trickbot_loader32 behavioral2/memory/4504-26-0x0000000000D90000-0x0000000000DBE000-memory.dmp trickbot_loader32 behavioral2/memory/4504-29-0x0000000000D90000-0x0000000000DBE000-memory.dmp trickbot_loader32 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation b4e2db7927219c5a8a6de22e7a159f40N.exe -
Executes dropped EXE 2 IoCs
pid Process 3984 аНаоすは래별.exe 4504 аНаоすは래별.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4e2db7927219c5a8a6de22e7a159f40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language аНаоすは래별.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 4524 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4472 b4e2db7927219c5a8a6de22e7a159f40N.exe 4472 b4e2db7927219c5a8a6de22e7a159f40N.exe 3984 аНаоすは래별.exe 3984 аНаоすは래별.exe 4504 аНаоすは래별.exe 4504 аНаоすは래별.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4472 wrote to memory of 3984 4472 b4e2db7927219c5a8a6de22e7a159f40N.exe 83 PID 4472 wrote to memory of 3984 4472 b4e2db7927219c5a8a6de22e7a159f40N.exe 83 PID 4472 wrote to memory of 3984 4472 b4e2db7927219c5a8a6de22e7a159f40N.exe 83 PID 3984 wrote to memory of 4292 3984 аНаоすは래별.exe 91 PID 3984 wrote to memory of 4292 3984 аНаоすは래별.exe 91 PID 3984 wrote to memory of 4292 3984 аНаоすは래별.exe 91 PID 3984 wrote to memory of 4292 3984 аНаоすは래별.exe 91 PID 4504 wrote to memory of 4524 4504 аНаоすは래별.exe 98 PID 4504 wrote to memory of 4524 4504 аНаоすは래별.exe 98 PID 4504 wrote to memory of 4524 4504 аНаоすは래별.exe 98 PID 4504 wrote to memory of 4524 4504 аНаоすは래별.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4e2db7927219c5a8a6de22e7a159f40N.exe"C:\Users\Admin\AppData\Local\Temp\b4e2db7927219c5a8a6de22e7a159f40N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\ProgramData\аНаоすは래별.exe"C:\ProgramData\аНаоすは래별.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4292
-
-
-
C:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exeC:\Users\Admin\AppData\Roaming\NuiGet\аНаоすは래별.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5b4e2db7927219c5a8a6de22e7a159f40
SHA142e7205f35ffa5311208867cc3ac563d0c6874af
SHA256cd0a125a6af8b014b593281246a0dad433934beaa5a751e8179eb4796ae2f4e2
SHA512bc9a8d85de090618d4abc89231828d7aee247f75b0e2971bed579add7445d6fc42777bb5aaed035817f77e8728990aa791636298176cac425ff3f6f580166201