Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
Users/cldieckmann/AppData/Roaming/windirect/ьяшмBCCC.exe
Resource
win7-20240903-en
General
-
Target
Users/cldieckmann/AppData/Roaming/windirect/ьяшмBCCC.exe
-
Size
507KB
-
MD5
2e3926b7123e1ec3cd57d7ffd7072bd3
-
SHA1
9077c965165d91d62023cbfb238bfe42a9720b6c
-
SHA256
f1f026eb520ff82fdae1b939b7f440d94dad05935717360763f924b239448c06
-
SHA512
be5fc9b5b4fa50a3fb2a5efd343c240478547e32c7dfe6389a6b39ee7a8fb8ae7053197c6c5c53b36154280938bf9f9a358c0e0d2fb1ec042223a58d2578de27
-
SSDEEP
12288:ylLeNBmly/c9JfUAeIcLE7G2D2FoMlZg/V:SLeNBmly/UUdU7qPg/V
Malware Config
Signatures
-
Trickbot family
-
Trickbot x86 loader 8 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral2/memory/3276-4-0x00000000023C0000-0x00000000023F1000-memory.dmp trickbot_loader32 behavioral2/memory/3276-1-0x0000000002400000-0x0000000002434000-memory.dmp trickbot_loader32 behavioral2/memory/4964-16-0x0000000002350000-0x0000000002384000-memory.dmp trickbot_loader32 behavioral2/memory/4964-22-0x0000000002390000-0x00000000023C1000-memory.dmp trickbot_loader32 behavioral2/memory/4964-21-0x0000000002060000-0x0000000002090000-memory.dmp trickbot_loader32 behavioral2/memory/4964-20-0x0000000002390000-0x00000000023C1000-memory.dmp trickbot_loader32 behavioral2/memory/4964-23-0x0000000002390000-0x00000000023C1000-memory.dmp trickbot_loader32 behavioral2/memory/4964-27-0x0000000002390000-0x00000000023C1000-memory.dmp trickbot_loader32 -
Dave packer 3 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral2/memory/3276-4-0x00000000023C0000-0x00000000023F1000-memory.dmp dave behavioral2/memory/3276-1-0x0000000002400000-0x0000000002434000-memory.dmp dave behavioral2/memory/4964-16-0x0000000002350000-0x0000000002384000-memory.dmp dave -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ьяшмBCCC.exe -
Executes dropped EXE 2 IoCs
pid Process 4964 ьяшмDCCC.exe 4524 ьяшмBCCC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ьяшмBCCC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ьяшмDCCC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ьяшмBCCC.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3276 ьяшмBCCC.exe 4964 ьяшмDCCC.exe 4524 ьяшмBCCC.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3276 wrote to memory of 4964 3276 ьяшмBCCC.exe 88 PID 3276 wrote to memory of 4964 3276 ьяшмBCCC.exe 88 PID 3276 wrote to memory of 4964 3276 ьяшмBCCC.exe 88 PID 4964 wrote to memory of 4364 4964 ьяшмDCCC.exe 95 PID 4964 wrote to memory of 4364 4964 ьяшмDCCC.exe 95 PID 4964 wrote to memory of 4364 4964 ьяшмDCCC.exe 95 PID 4964 wrote to memory of 4364 4964 ьяшмDCCC.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Users\cldieckmann\AppData\Roaming\windirect\ьяшмBCCC.exe"C:\Users\Admin\AppData\Local\Temp\Users\cldieckmann\AppData\Roaming\windirect\ьяшмBCCC.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\ProgramData\ьяшмDCCC.exe"C:\ProgramData\ьяшмDCCC.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:4364
-
-
-
C:\Users\Admin\AppData\Roaming\windirect\ьяшмBCCC.exeC:\Users\Admin\AppData\Roaming\windirect\ьяшмBCCC.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507KB
MD52e3926b7123e1ec3cd57d7ffd7072bd3
SHA19077c965165d91d62023cbfb238bfe42a9720b6c
SHA256f1f026eb520ff82fdae1b939b7f440d94dad05935717360763f924b239448c06
SHA512be5fc9b5b4fa50a3fb2a5efd343c240478547e32c7dfe6389a6b39ee7a8fb8ae7053197c6c5c53b36154280938bf9f9a358c0e0d2fb1ec042223a58d2578de27