Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 22:33
Static task
static1
Behavioral task
behavioral1
Sample
550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96cN.exe
Resource
win7-20240903-en
General
-
Target
550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96cN.exe
-
Size
368KB
-
MD5
31f48d579e81fd0a9367431ba92794e0
-
SHA1
4ae71094a830b4329a5ebb7a861f3ebeb8ac9def
-
SHA256
550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96c
-
SHA512
266468a1bc059c06a7053132e9f35af93bca2a9c35cadc92cf21df51dca6c895b3f1298edafb31140ba7a42160281d96ea32185ba398fc9599388849083c227a
-
SSDEEP
6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4q3:emSuOcHmnYhrDMTrban4q3
Malware Config
Signatures
-
Trickbot x86 loader 6 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/2364-1-0x0000000000B10000-0x0000000000B39000-memory.dmp trickbot_loader32 behavioral2/memory/2364-9-0x0000000000B10000-0x0000000000B39000-memory.dmp trickbot_loader32 behavioral2/memory/2208-8-0x0000000001350000-0x0000000001379000-memory.dmp trickbot_loader32 behavioral2/memory/2208-24-0x0000000001350000-0x0000000001379000-memory.dmp trickbot_loader32 behavioral2/memory/832-28-0x0000000001740000-0x0000000001769000-memory.dmp trickbot_loader32 behavioral2/memory/832-42-0x0000000001740000-0x0000000001769000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
pid Process 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2208 2364 550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96cN.exe 89 PID 2364 wrote to memory of 2208 2364 550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96cN.exe 89 PID 2364 wrote to memory of 2208 2364 550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96cN.exe 89 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 2208 wrote to memory of 4656 2208 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 90 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 PID 832 wrote to memory of 4976 832 660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96cN.exe"C:\Users\Admin\AppData\Local\Temp\550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96cN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\WNetval\660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exeC:\Users\Admin\AppData\Roaming\WNetval\660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4656
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3840,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=1308 /prefetch:81⤵PID:3884
-
C:\Users\Admin\AppData\Roaming\WNetval\660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exeC:\Users\Admin\AppData\Roaming\WNetval\660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2170637797-568393320-3232933035-1000\0f5007522459c86e95ffcc62f32308f1_76278eb0-9988-43b4-9423-af5897ebbcb4
Filesize1KB
MD575596554d98e1d138f90bc776226a84d
SHA1e4452d84e65cefb2992eb0d974ad90712cef6e66
SHA256e444ec89fdf47b1e8f7646a0c9442a72abcac7f37c3c3d26e31bd8f581d3a827
SHA5129479548057a0d6a71dafe01049b87792af4228c89cc9e8155bfe015cbae27e3d04a0a47b8115a2428f66015bfa884a704aee2506f94eb3f13b9e84ee4be15c45
-
C:\Users\Admin\AppData\Roaming\WNetval\660dc0cd92d1d6cca9d363446898ec0e7c40a282c1bf946f22baca7b04bfe97cN.exe
Filesize368KB
MD531f48d579e81fd0a9367431ba92794e0
SHA14ae71094a830b4329a5ebb7a861f3ebeb8ac9def
SHA256550dc0cd82d1d5cca8d353445797ec0e6c40a272c1bf945f22baca6b04bfe96c
SHA512266468a1bc059c06a7053132e9f35af93bca2a9c35cadc92cf21df51dca6c895b3f1298edafb31140ba7a42160281d96ea32185ba398fc9599388849083c227a