Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-09-2024 18:37

General

  • Target

    0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe

  • Size

    368KB

  • MD5

    2299bd938a86b2a1ae634e8358c93021

  • SHA1

    e616badfec1dbdbbf6a7cd459eac3b05f6fef636

  • SHA256

    0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648

  • SHA512

    31b1af8af75218be9afc9c10aa74375725de82f72fe5c7baaa9e43b04c6de63b1c5c4a02b30b362d22f87a41ece9d0494aa78e58910f1bdda25c8d393c209b28

  • SSDEEP

    6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4qT:emSuOcHmnYhrDMTrban4qT

Malware Config

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot x86 loader 6 IoCs

    Detected Trickbot's x86 loader that unpacks the x86 payload.

  • Executes dropped EXE 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe
    "C:\Users\Admin\AppData\Local\Temp\0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe
      C:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
          PID:4244
    • C:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe
      C:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe
        2⤵
          PID:4900

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1194130065-3471212556-1656947724-1000\0f5007522459c86e95ffcc62f32308f1_a53bb4ca-6113-48bb-9609-441860fdd0d7

        Filesize

        1KB

        MD5

        2c04e04f36265cd45dbcf745d79a10d7

        SHA1

        44b3734d54bc542d1897f325da11b44d6cb44934

        SHA256

        50c7f277844378d2bd091687aef4eeba8e6288a7a67d3e6fc12a8b2e9eba9781

        SHA512

        2487e53258eecde0ea34b29d13b8f9769cc2f29690e4fe2be8aacf6c53a2b428124c1664c38f41dedf6eafe79670bba5977b7db2d3c1336c67ba72395d4927ef

      • C:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe

        Filesize

        368KB

        MD5

        2299bd938a86b2a1ae634e8358c93021

        SHA1

        e616badfec1dbdbbf6a7cd459eac3b05f6fef636

        SHA256

        0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648

        SHA512

        31b1af8af75218be9afc9c10aa74375725de82f72fe5c7baaa9e43b04c6de63b1c5c4a02b30b362d22f87a41ece9d0494aa78e58910f1bdda25c8d393c209b28

      • memory/528-42-0x0000000001960000-0x0000000001989000-memory.dmp

        Filesize

        164KB

      • memory/528-41-0x0000000001F20000-0x00000000021E9000-memory.dmp

        Filesize

        2.8MB

      • memory/528-40-0x0000000001E60000-0x0000000001F1E000-memory.dmp

        Filesize

        760KB

      • memory/528-34-0x0000000001E40000-0x0000000001E41000-memory.dmp

        Filesize

        4KB

      • memory/528-28-0x0000000001960000-0x0000000001989000-memory.dmp

        Filesize

        164KB

      • memory/1644-1-0x0000000000D40000-0x0000000000D69000-memory.dmp

        Filesize

        164KB

      • memory/1644-7-0x0000000000D40000-0x0000000000D69000-memory.dmp

        Filesize

        164KB

      • memory/3280-23-0x00000000029C0000-0x0000000002C89000-memory.dmp

        Filesize

        2.8MB

      • memory/3280-22-0x0000000002900000-0x00000000029BE000-memory.dmp

        Filesize

        760KB

      • memory/3280-24-0x00000000009E0000-0x0000000000A09000-memory.dmp

        Filesize

        164KB

      • memory/3280-15-0x0000000000A60000-0x0000000000A61000-memory.dmp

        Filesize

        4KB

      • memory/3280-11-0x0000000010000000-0x0000000010007000-memory.dmp

        Filesize

        28KB

      • memory/3280-9-0x00000000009E0000-0x0000000000A09000-memory.dmp

        Filesize

        164KB

      • memory/4244-21-0x000002C20D360000-0x000002C20D361000-memory.dmp

        Filesize

        4KB

      • memory/4244-17-0x0000000010000000-0x000000001001F000-memory.dmp

        Filesize

        124KB

      • memory/4244-16-0x0000000010000000-0x000000001001F000-memory.dmp

        Filesize

        124KB

      • memory/4900-44-0x0000000010000000-0x000000001001F000-memory.dmp

        Filesize

        124KB