Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
General
-
Target
sample.exe
-
Size
284KB
-
MD5
99b81672c6ec04e7e6e6063b40d9127c
-
SHA1
2f29fb6c87fd77f2ff5df3312e0c0667b76af3cf
-
SHA256
447e9c417b7c9cf6e03086ca1da31a718e5159f454bf91efad09f240572db967
-
SHA512
b0e877ed117457a8a4458816309c8e68a911e0b6d17d449730e09beec84174abd3b97493dcea6b3dc55617471797371d4d6cf84c58f117b8bf826da0349d3e8f
-
SSDEEP
6144:2fdpBROKDYVbCFm03OHmuyVSgea6ayo2znPNobpL9YFDdyC:2FpDTsVL03OGugRB6ayo2zPwpRqJyC
Malware Config
Signatures
-
Trickbot family
-
Dave packer 2 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral1/memory/1900-0-0x0000000000260000-0x0000000000292000-memory.dmp dave behavioral1/memory/1900-5-0x0000000000230000-0x0000000000260000-memory.dmp dave -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1900 sample.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2296 wermgr.exe Token: SeDebugPrivilege 2296 wermgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2296 1900 sample.exe 32 PID 1900 wrote to memory of 2296 1900 sample.exe 32 PID 1900 wrote to memory of 2296 1900 sample.exe 32 PID 1900 wrote to memory of 2296 1900 sample.exe 32 PID 1900 wrote to memory of 2296 1900 sample.exe 32 PID 1900 wrote to memory of 2296 1900 sample.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296
-