Analysis
-
max time kernel
113s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe
Resource
win7-20240903-en
General
-
Target
3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe
-
Size
368KB
-
MD5
1b5b4f1fca579484be055e92d1469655
-
SHA1
653617c5ed422e4700cb1b596dde5f52ba04476f
-
SHA256
3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11
-
SHA512
3fc609eb1ca786a422089ebdb49e7720ff2ab0a8c65dd64ab9fce72f145b3143d63df6ee4699ffa0dad087ff5c4cf63e2f1a0b4c091f4b154b7e92fadf748d3b
-
SSDEEP
6144:eo5N5OazOZaTDWlVnrchrahdOxveC2wo80/agxb0zLz4qW:emSuOcHmnYhrDMTrban4qW
Malware Config
Signatures
-
Trickbot family
-
Trickbot x86 loader 5 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3312-1-0x0000000000790000-0x00000000007B9000-memory.dmp trickbot_loader32 behavioral2/memory/3312-6-0x0000000000790000-0x00000000007B9000-memory.dmp trickbot_loader32 behavioral2/memory/3832-9-0x0000000000E50000-0x0000000000E79000-memory.dmp trickbot_loader32 behavioral2/memory/3832-24-0x0000000000E50000-0x0000000000E79000-memory.dmp trickbot_loader32 behavioral2/memory/3192-41-0x0000000000ED0000-0x0000000000EF9000-memory.dmp trickbot_loader32 -
Executes dropped EXE 2 IoCs
Processes:
3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exepid Process 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exedescription pid Process Token: SeTcbPrivilege 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exedescription pid Process procid_target PID 3312 wrote to memory of 3832 3312 3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe 84 PID 3312 wrote to memory of 3832 3312 3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe 84 PID 3312 wrote to memory of 3832 3312 3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe 84 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3832 wrote to memory of 2520 3832 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 86 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 PID 3192 wrote to memory of 4640 3192 3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe"C:\Users\Admin\AppData\Local\Temp\3579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Roaming\WNetval\3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exeC:\Users\Admin\AppData\Roaming\WNetval\3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2520
-
-
-
C:\Users\Admin\AppData\Roaming\WNetval\3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exeC:\Users\Admin\AppData\Roaming\WNetval\3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4050598569-1597076380-177084960-1000\0f5007522459c86e95ffcc62f32308f1_cca0d105-8260-4611-8c12-bd85a7208b9f
Filesize1KB
MD5eb71d650f7408486ea4acc5c16d7d151
SHA1b72285c8688500b60777b05b8ae5d059d8d88c6e
SHA256b1eec31af4935308cb9e06d1c4d734fa4b404a43e0911ea7f267535ec0e27928
SHA512577b4d26e1217da2382034344f8fe188d7cd74920027850805bb77c32b4c1681433efc1167fb9efb21a6a71f34a568653feb7ec6bc83f9c45ab9e30d65400545
-
C:\Users\Admin\AppData\Roaming\WNetval\3689c6c7ffee761cf4f6ae8f32998fca19e191a33846d2abe09c247d9a027d11.exe
Filesize368KB
MD51b5b4f1fca579484be055e92d1469655
SHA1653617c5ed422e4700cb1b596dde5f52ba04476f
SHA2563579c5c6ffee651cf4f5ae7f32887fca18e181a33745d2abe09c246d8a026d11
SHA5123fc609eb1ca786a422089ebdb49e7720ff2ab0a8c65dd64ab9fce72f145b3143d63df6ee4699ffa0dad087ff5c4cf63e2f1a0b4c091f4b154b7e92fadf748d3b