Analysis
-
max time kernel
93s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe
Resource
win7-20240903-en
General
-
Target
85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe
-
Size
572KB
-
MD5
bad7e93e13bd61310bec6759e5bcc41e
-
SHA1
6ebf5ada5bdb635d028ae5f8d241d1b819d1bcbc
-
SHA256
85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a
-
SHA512
ff3ffa2cda1167abfebbfd6871550bb70cd5bad590f8534d6effd33652d66b3f8a8e74d7727aa40f254432fbce1ae9a45d36c04d13e709c64aafe139ddca2f4d
-
SSDEEP
12288:Qqb3mP9FQtynVTEHX7cQxXNMsxXrKY/iXMKOJcnsX6:SQBx+Y/iNZsX6
Malware Config
Signatures
-
Trickbot family
-
Trickbot x86 loader 8 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2248-0-0x0000000001EC0000-0x0000000001EF3000-memory.dmp trickbot_loader32 behavioral1/memory/2248-5-0x0000000000520000-0x0000000000550000-memory.dmp trickbot_loader32 behavioral1/memory/2380-20-0x00000000003B0000-0x00000000003DF000-memory.dmp trickbot_loader32 behavioral1/memory/2380-21-0x00000000005D0000-0x0000000000600000-memory.dmp trickbot_loader32 behavioral1/memory/2380-19-0x00000000005D0000-0x0000000000600000-memory.dmp trickbot_loader32 behavioral1/memory/2380-14-0x00000000002E0000-0x0000000000313000-memory.dmp trickbot_loader32 behavioral1/memory/2380-25-0x00000000005D0000-0x0000000000600000-memory.dmp trickbot_loader32 behavioral1/memory/2936-30-0x0000000000900000-0x0000000000933000-memory.dmp trickbot_loader32 -
Dave packer 4 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral1/memory/2248-0-0x0000000001EC0000-0x0000000001EF3000-memory.dmp dave behavioral1/memory/2248-5-0x0000000000520000-0x0000000000550000-memory.dmp dave behavioral1/memory/2380-14-0x00000000002E0000-0x0000000000313000-memory.dmp dave behavioral1/memory/2936-30-0x0000000000900000-0x0000000000933000-memory.dmp dave -
Executes dropped EXE 2 IoCs
pid Process 2380 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 2936 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe -
Loads dropped DLL 2 IoCs
pid Process 2248 85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe 2248 85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 1844 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2248 85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe 2380 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 2936 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2380 2248 85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe 30 PID 2248 wrote to memory of 2380 2248 85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe 30 PID 2248 wrote to memory of 2380 2248 85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe 30 PID 2248 wrote to memory of 2380 2248 85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe 30 PID 2380 wrote to memory of 2784 2380 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2380 wrote to memory of 2784 2380 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2380 wrote to memory of 2784 2380 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2380 wrote to memory of 2784 2380 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2380 wrote to memory of 2784 2380 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2380 wrote to memory of 2784 2380 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 1592 wrote to memory of 2936 1592 taskeng.exe 34 PID 1592 wrote to memory of 2936 1592 taskeng.exe 34 PID 1592 wrote to memory of 2936 1592 taskeng.exe 34 PID 1592 wrote to memory of 2936 1592 taskeng.exe 34 PID 2936 wrote to memory of 1844 2936 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2936 wrote to memory of 1844 2936 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2936 wrote to memory of 1844 2936 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2936 wrote to memory of 1844 2936 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2936 wrote to memory of 1844 2936 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2936 wrote to memory of 1844 2936 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe"C:\Users\Admin\AppData\Local\Temp\85fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\ProgramData\ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe"C:\ProgramData\ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2784
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A9C1A1A1-06AB-432F-B034-163D89EE57BE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\WinNetCore\ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exeC:\Users\Admin\AppData\Roaming\WinNetCore\ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572KB
MD5bad7e93e13bd61310bec6759e5bcc41e
SHA16ebf5ada5bdb635d028ae5f8d241d1b819d1bcbc
SHA25685fe9954a46388daf9f25ea2d4531b87147c6a2d37ebb25f77f0886a2dc6dd6a
SHA512ff3ffa2cda1167abfebbfd6871550bb70cd5bad590f8534d6effd33652d66b3f8a8e74d7727aa40f254432fbce1ae9a45d36c04d13e709c64aafe139ddca2f4d