Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe
Resource
win7-20240903-en
General
-
Target
0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe
-
Size
368KB
-
MD5
2299bd938a86b2a1ae634e8358c93021
-
SHA1
e616badfec1dbdbbf6a7cd459eac3b05f6fef636
-
SHA256
0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648
-
SHA512
31b1af8af75218be9afc9c10aa74375725de82f72fe5c7baaa9e43b04c6de63b1c5c4a02b30b362d22f87a41ece9d0494aa78e58910f1bdda25c8d393c209b28
-
SSDEEP
6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4qT:emSuOcHmnYhrDMTrban4qT
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/1644-1-0x0000000000D40000-0x0000000000D69000-memory.dmp trickbot_loader32 behavioral2/memory/1644-7-0x0000000000D40000-0x0000000000D69000-memory.dmp trickbot_loader32 behavioral2/memory/3280-9-0x00000000009E0000-0x0000000000A09000-memory.dmp trickbot_loader32 behavioral2/memory/3280-24-0x00000000009E0000-0x0000000000A09000-memory.dmp trickbot_loader32 behavioral2/memory/528-28-0x0000000001960000-0x0000000001989000-memory.dmp trickbot_loader32 behavioral2/memory/528-42-0x0000000001960000-0x0000000001989000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exepid Process 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exedescription pid Process Token: SeTcbPrivilege 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exedescription pid Process procid_target PID 1644 wrote to memory of 3280 1644 0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe 82 PID 1644 wrote to memory of 3280 1644 0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe 82 PID 1644 wrote to memory of 3280 1644 0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe 82 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 3280 wrote to memory of 4244 3280 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 83 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 PID 528 wrote to memory of 4900 528 0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe"C:\Users\Admin\AppData\Local\Temp\0e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exeC:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4244
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exeC:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1194130065-3471212556-1656947724-1000\0f5007522459c86e95ffcc62f32308f1_a53bb4ca-6113-48bb-9609-441860fdd0d7
Filesize1KB
MD52c04e04f36265cd45dbcf745d79a10d7
SHA144b3734d54bc542d1897f325da11b44d6cb44934
SHA25650c7f277844378d2bd091687aef4eeba8e6288a7a67d3e6fc12a8b2e9eba9781
SHA5122487e53258eecde0ea34b29d13b8f9769cc2f29690e4fe2be8aacf6c53a2b428124c1664c38f41dedf6eafe79670bba5977b7db2d3c1336c67ba72395d4927ef
-
C:\Users\Admin\AppData\Roaming\WNetval\0e4d8fec11799a076d9b6da404f69ccd8ca4a9aaecee1c2efbd26828a8631749.exe
Filesize368KB
MD52299bd938a86b2a1ae634e8358c93021
SHA1e616badfec1dbdbbf6a7cd459eac3b05f6fef636
SHA2560e4d7fec11699a065d9b5da404f58ccd7ca4a8aaecee1c2efbd25727a7531648
SHA51231b1af8af75218be9afc9c10aa74375725de82f72fe5c7baaa9e43b04c6de63b1c5c4a02b30b362d22f87a41ece9d0494aa78e58910f1bdda25c8d393c209b28