Analysis
-
max time kernel
94s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/01/2025, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe
Resource
win7-20241010-en
General
-
Target
610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe
-
Size
572KB
-
MD5
797fab7c7ead5ebacf2e5ee7f9f2b420
-
SHA1
d76eb500293cfe6a1dbf828c887ab3a590c3933b
-
SHA256
610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2
-
SHA512
9ebc52155c8a855979b8ea20155eed554861d102f54f5ce92b5c20bdd9afc0a90cac8f54a3bf19a62069252785914e79db12cb36c69bc03e515349c92032d1b8
-
SSDEEP
12288:Qqb3mP9FQtynVTEHX7cQxXNMsxXrKY/iXMKOJcnsX+:SQBx+Y/iNZsX+
Malware Config
Signatures
-
Trickbot family
-
Trickbot x86 loader 8 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/2044-0-0x0000000000630000-0x0000000000663000-memory.dmp trickbot_loader32 behavioral1/memory/2044-5-0x00000000003B0000-0x00000000003E0000-memory.dmp trickbot_loader32 behavioral1/memory/2352-19-0x00000000004A0000-0x00000000004D0000-memory.dmp trickbot_loader32 behavioral1/memory/2352-21-0x00000000004A0000-0x00000000004D0000-memory.dmp trickbot_loader32 behavioral1/memory/2352-20-0x00000000003D0000-0x00000000003FF000-memory.dmp trickbot_loader32 behavioral1/memory/2352-15-0x0000000000390000-0x00000000003C3000-memory.dmp trickbot_loader32 behavioral1/memory/2352-24-0x00000000004A0000-0x00000000004D0000-memory.dmp trickbot_loader32 behavioral1/memory/2828-30-0x0000000000520000-0x0000000000553000-memory.dmp trickbot_loader32 -
Dave packer 4 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral1/memory/2044-0-0x0000000000630000-0x0000000000663000-memory.dmp dave behavioral1/memory/2044-5-0x00000000003B0000-0x00000000003E0000-memory.dmp dave behavioral1/memory/2352-15-0x0000000000390000-0x00000000003C3000-memory.dmp dave behavioral1/memory/2828-30-0x0000000000520000-0x0000000000553000-memory.dmp dave -
Executes dropped EXE 2 IoCs
pid Process 2352 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 2828 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe -
Loads dropped DLL 2 IoCs
pid Process 2044 610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe 2044 610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 1920 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2044 610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe 2352 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 2828 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2352 2044 610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe 30 PID 2044 wrote to memory of 2352 2044 610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe 30 PID 2044 wrote to memory of 2352 2044 610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe 30 PID 2044 wrote to memory of 2352 2044 610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe 30 PID 2352 wrote to memory of 2092 2352 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2352 wrote to memory of 2092 2352 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2352 wrote to memory of 2092 2352 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2352 wrote to memory of 2092 2352 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2352 wrote to memory of 2092 2352 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2352 wrote to memory of 2092 2352 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 31 PID 2096 wrote to memory of 2828 2096 taskeng.exe 34 PID 2096 wrote to memory of 2828 2096 taskeng.exe 34 PID 2096 wrote to memory of 2828 2096 taskeng.exe 34 PID 2096 wrote to memory of 2828 2096 taskeng.exe 34 PID 2828 wrote to memory of 1920 2828 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2828 wrote to memory of 1920 2828 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2828 wrote to memory of 1920 2828 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2828 wrote to memory of 1920 2828 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2828 wrote to memory of 1920 2828 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 PID 2828 wrote to memory of 1920 2828 ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe"C:\Users\Admin\AppData\Local\Temp\610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\ProgramData\ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe"C:\ProgramData\ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2092
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BFD0FAF1-31B5-448B-95C1-2FF418B1AFEE} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Roaming\WinNetCore\ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exeC:\Users\Admin\AppData\Roaming\WinNetCore\ВФЯФвцвCբլիբլիթж;;բլիթ;բլիթ;яЫФբլիթвавю.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572KB
MD5797fab7c7ead5ebacf2e5ee7f9f2b420
SHA1d76eb500293cfe6a1dbf828c887ab3a590c3933b
SHA256610c8e079c6c42b1637788c9a441bcdd67c4f25304b41820c9bed0a829d775d2
SHA5129ebc52155c8a855979b8ea20155eed554861d102f54f5ce92b5c20bdd9afc0a90cac8f54a3bf19a62069252785914e79db12cb36c69bc03e515349c92032d1b8