Overview
overview
10Static
static
10Malware-1-...30.exe
windows11-21h2-x64
10Malware-1-...40.exe
windows11-21h2-x64
3Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-.../5.exe
windows11-21h2-x64
10Malware-1-...91.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
7Malware-1-...ad.exe
windows11-21h2-x64
3Malware-1-...ti.exe
windows11-21h2-x64
5Malware-1-...an.bat
windows11-21h2-x64
7Malware-1-...an.exe
windows11-21h2-x64
3Malware-1-...ve.bat
windows11-21h2-x64
7Malware-1-...ve.exe
windows11-21h2-x64
6Malware-1-...ya.exe
windows11-21h2-x64
Malware-1-...re.exe
windows11-21h2-x64
10Malware-1-...ry.exe
windows11-21h2-x64
10Malware-1-...ck.exe
windows11-21h2-x64
3Malware-1-...he.exe
windows11-21h2-x64
10Malware-1-...op.exe
windows11-21h2-x64
7Malware-1-...rb.exe
windows11-21h2-x64
10Malware-1-...ue.exe
windows11-21h2-x64
1Malware-1-...ng.exe
windows11-21h2-x64
6Malware-1-...kt.bat
windows11-21h2-x64
7Malware-1-...o3.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
10Malware-1-.../m.exe
windows11-21h2-x64
Malware-1-...o3.exe
windows11-21h2-x64
9Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-...nf.exe
windows11-21h2-x64
10Malware-1-.../o.exe
windows11-21h2-x64
3Malware-1-...B8.exe
windows11-21h2-x64
10Malware-1-...ic.exe
windows11-21h2-x64
3Malware-1-...in.exe
windows11-21h2-x64
10Resubmissions
17-01-2025 20:14
250117-yz7h3s1qfw 1017-01-2025 20:12
250117-yy9l2sslcr 1017-01-2025 17:25
250117-vy9p9sxpez 1017-01-2025 17:21
250117-vw8eesyjfp 1017-01-2025 14:16
250117-rk9ass1rhk 1017-01-2025 14:12
250117-rhv1ds1lds 1016-01-2025 12:52
250116-p4et7a1mez 1016-01-2025 12:50
250116-p29xjssjep 10Analysis
-
max time kernel
864s -
max time network
888s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16-01-2025 12:50
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Malware-1-master/2887140.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/32.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Malware-1-master/5.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/96591.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Malware-1-master/Amadey.exe
Resource
win11-20241023-en
Behavioral task
behavioral7
Sample
Malware-1-master/Download.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Malware-1-master/Illuminati.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Malware-1-master/Petya.exe
Resource
win11-20241023-en
Behavioral task
behavioral14
Sample
Malware-1-master/Software.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/WannaCry.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/apache.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Malware-1-master/butterflyondesktop.exe
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
Malware-1-master/crb.exe
Resource
win11-20241023-en
Behavioral task
behavioral20
Sample
Malware-1-master/eternalblue.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/fear.png.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Malware-1-master/getr3kt.bat
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/iimo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
Malware-1-master/jey.exe
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/m.exe
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
Malware-1-master/mo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/mo332.exe
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
Malware-1-master/mysqlconf.exe
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/o.exe
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
Malware-1-master/qOA7iZJcoB8.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/wintonic.exe
Resource
win11-20241023-en
General
-
Target
Malware-1-master/youwin.exe
-
Size
379KB
-
MD5
c3f3773a596db65c6491b578db621c45
-
SHA1
ba5529fe2d6648ebfa93c17145f5570f448e1111
-
SHA256
dfe2c886d9a6e9b26cdddba621fda00832a59def9813177863723e33c8011b0c
-
SHA512
8d7fab47b741c2e64533c30400cc6b8c20750948f9a9ad4382463ea920021d875eb9dd4d424d182cf25ffdfa96ae2088e89ae8220dd10e161fd9cbb37e213061
-
SSDEEP
6144:dVH5X7dPd2cUnZF+ZXsFv+g11ZebOzWl4QFUTUPYeOEH9yyIKC0ywAHTWZ:dVH5X7dPd2zcO+8ebRJlQeOEH9ytfvw4
Malware Config
Extracted
trickbot
1000312
sun10
82.202.212.172:443
24.247.181.155:449
24.247.182.39:449
109.234.38.220:443
24.247.182.29:449
24.247.182.7:449
71.14.129.8:449
198.46.131.164:443
74.132.135.120:449
198.46.160.217:443
71.94.101.25:443
206.130.141.255:449
192.3.52.107:443
74.140.160.33:449
65.31.241.133:449
140.190.54.187:449
24.247.181.226:449
108.160.196.130:449
23.94.187.116:443
103.110.91.118:449
188.68.211.211:443
75.108.123.165:449
72.189.124.41:449
74.134.5.113:449
105.27.171.234:449
182.253.20.66:449
172.222.97.179:449
72.241.62.188:449
198.46.198.241:443
199.227.126.250:449
97.87.172.0:449
24.247.182.174:449
94.232.20.113:443
190.145.74.84:449
47.49.168.50:443
64.128.175.37:449
24.227.222.4:449
-
autorunControl:GetSystemInfoName:systeminfoName:injectDllName:pwgrab
Signatures
-
Trickbot family
-
Trickbot x86 loader 4 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral32/memory/3896-5-0x0000000001140000-0x0000000001180000-memory.dmp trickbot_loader32 behavioral32/memory/3896-11-0x0000000001140000-0x0000000001180000-memory.dmp trickbot_loader32 behavioral32/memory/3180-18-0x0000000000C00000-0x0000000000C40000-memory.dmp trickbot_loader32 behavioral32/memory/3180-36-0x0000000000C00000-0x0000000000C40000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 3180 youwin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\NetSf\youwin.exe = "C:\\Users\\Admin\\AppData\\Roaming\\NetSf\\youwin.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language youwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language youwin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 3180 3896 youwin.exe 77 PID 3896 wrote to memory of 3180 3896 youwin.exe 77 PID 3896 wrote to memory of 3180 3896 youwin.exe 77 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 PID 3180 wrote to memory of 5800 3180 youwin.exe 78 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\youwin.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\youwin.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Roaming\NetSf\youwin.exeC:\Users\Admin\AppData\Roaming\NetSf\youwin.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:5800 -
C:\Windows\SYSTEM32\regini.exeregini C:\Users\Admin\AppData\Local\Temp\tmp0514⤵PID:2956
-
-
C:\Windows\SYSTEM32\regini.exeregini C:\Users\Admin\AppData\Local\Temp\tmp0514⤵PID:4796
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67B
MD5e4bcd320585af9f77671cc6e91fe9de6
SHA115f12439eb3e133affb37b29e41e57d89fc90e06
SHA256a1e0f5a9cfc9615222f04e65455c7c4c1ba86710275afffd472428a293c31ec8
SHA51200497885531c0b84fe869828e5f2c0631f2f175f961c62175736487ae703252ba7393f882ffe99d8c4bcdb951172e35daa9ca41f45e64ce97fbae7721b25c112
-
Filesize
67B
MD558b2f90cc0182925ae0bab51700b14ab
SHA1d2975adeb8dc68f2f5e10edee524de78e79828db
SHA2568114822fe9a58e5ba08abb480dd595109c66a49d9afc404f85843915694c2964
SHA512de6154d3d44c7e332f5cf1f3b1e4f20612ecd37f08fa60382ecc5008af2d9a55216357d6927e706fd2ef60b772e7941631fdfe9b1d615e5264e99cffe59ad782
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3973800497-2716210218-310192997-1000\0f5007522459c86e95ffcc62f32308f1_43ef074c-17c1-4956-ab3f-c3b0c6ae62b9
Filesize1KB
MD508394a38fe137b35557cde4eed6bd553
SHA1f57f6332189279ef8c4d20ee71f4baf4fe5ef6e3
SHA256804b9ff4b73e29a405ea8c18bf93609cb06414a4c2a5a40fa08b4b68a4fad64c
SHA5129e7d7c5bbb2fd5805a856d7fe09dc04598d64ba3537d11e3b9edc6ea2c865b4329c465458d5c4d3cb9cc9efb182699476fb856d18b22e755f206c5ef08d434e2
-
Filesize
379KB
MD5c3f3773a596db65c6491b578db621c45
SHA1ba5529fe2d6648ebfa93c17145f5570f448e1111
SHA256dfe2c886d9a6e9b26cdddba621fda00832a59def9813177863723e33c8011b0c
SHA5128d7fab47b741c2e64533c30400cc6b8c20750948f9a9ad4382463ea920021d875eb9dd4d424d182cf25ffdfa96ae2088e89ae8220dd10e161fd9cbb37e213061