Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 17:36
Behavioral task
behavioral1
Sample
68a34973ae0a7bebdd8415ae1a79296d05c69f6aeed8fc90b21fe3a1fde5687b.exe
Resource
win7-20240903-en
General
-
Target
68a34973ae0a7bebdd8415ae1a79296d05c69f6aeed8fc90b21fe3a1fde5687b.exe
-
Size
110KB
-
MD5
595b19e7618a77ecd00034182c74b0e4
-
SHA1
c5afa94c84a733dbd86edd2061614946aa9cfb19
-
SHA256
68a34973ae0a7bebdd8415ae1a79296d05c69f6aeed8fc90b21fe3a1fde5687b
-
SHA512
029a5bef5c5158b33a3eb025782abb3cddeb53223cb80f1fe38fda5e14c0831bf0524fb6ce66aab6cd1f756c10c0c0f20642245a07b073c788bdb7cca33061d2
-
SSDEEP
3072:wUJC1DZYjcOBmn9nK3lhK7kgB9DTfd+5SEsVoSfR:zIDZ6cOBkE3bKzB9DTV+mV
Malware Config
Extracted
trickbot
1000488
sat68
185.62.189.132:443
5.2.72.84:443
193.37.213.110:443
85.143.220.41:443
5.34.177.50:443
172.82.152.130:443
146.185.253.132:443
107.172.29.108:443
107.172.208.51:443
212.124.117.25:443
64.44.133.151:443
146.185.219.94:443
185.66.13.65:443
194.99.22.48:443
194.5.250.35:443
167.86.123.83:443
107.181.187.221:443
103.219.213.102:449
117.255.221.135:449
189.28.185.50:449
177.105.242.229:449
190.214.13.2:449
181.140.173.186:449
181.129.104.139:449
190.142.200.108:449
181.196.207.202:449
181.113.28.146:449
181.112.157.42:449
170.84.78.224:449
117.196.233.79:449
103.196.211.212:449
178.183.150.169:449
81.190.160.139:449
200.21.51.38:449
46.174.235.36:449
36.89.85.103:449
190.72.235.47:449
181.129.134.18:449
103.255.10.24:449
31.214.138.207:449
190.13.160.19:449
186.71.150.23:449
131.161.253.190:449
200.127.121.99:449
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
Executes dropped EXE 1 IoCs
pid Process 3056 88a34993ae0a9bebdd8417ae1a99298d07c89f8aeed8fc90b21fe3a1fde7889b.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68a34973ae0a7bebdd8415ae1a79296d05c69f6aeed8fc90b21fe3a1fde5687b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88a34993ae0a9bebdd8417ae1a99298d07c89f8aeed8fc90b21fe3a1fde7889b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 3056 88a34993ae0a9bebdd8417ae1a99298d07c89f8aeed8fc90b21fe3a1fde7889b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 3056 2692 taskeng.exe 32 PID 2692 wrote to memory of 3056 2692 taskeng.exe 32 PID 2692 wrote to memory of 3056 2692 taskeng.exe 32 PID 2692 wrote to memory of 3056 2692 taskeng.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\68a34973ae0a7bebdd8415ae1a79296d05c69f6aeed8fc90b21fe3a1fde5687b.exe"C:\Users\Admin\AppData\Local\Temp\68a34973ae0a7bebdd8415ae1a79296d05c69f6aeed8fc90b21fe3a1fde5687b.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2400
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC57BEAE-AF0D-45F1-BF31-DD67B0DDC5BE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\syshealth\88a34993ae0a9bebdd8417ae1a99298d07c89f8aeed8fc90b21fe3a1fde7889b.exeC:\Users\Admin\AppData\Roaming\syshealth\88a34993ae0a9bebdd8417ae1a99298d07c89f8aeed8fc90b21fe3a1fde7889b.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\syshealth\88a34993ae0a9bebdd8417ae1a99298d07c89f8aeed8fc90b21fe3a1fde7889b.exe
Filesize110KB
MD5595b19e7618a77ecd00034182c74b0e4
SHA1c5afa94c84a733dbd86edd2061614946aa9cfb19
SHA25668a34973ae0a7bebdd8415ae1a79296d05c69f6aeed8fc90b21fe3a1fde5687b
SHA512029a5bef5c5158b33a3eb025782abb3cddeb53223cb80f1fe38fda5e14c0831bf0524fb6ce66aab6cd1f756c10c0c0f20642245a07b073c788bdb7cca33061d2