Analysis
-
max time kernel
18s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 01:50
General
-
Target
dump.exe
-
Size
233KB
-
MD5
1cc7c6a60a79a4eab229480c36198bdc
-
SHA1
a99ba71c90aaaefacb5903d9a5e6169a514e8bcb
-
SHA256
369630719d5f7f6714bc61344e957016716f88b96cfcecd9535b6c75fc17e827
-
SHA512
0d262ab35901d16f42b53b7a631c6dd676e809a255d38b5a71d7af6f26c57fe53453cde67006330d91728c2918e6422134355083941e47c93bb7d1c1296011c6
-
SSDEEP
6144:hHd7PiYiPtEv1fhhyiW7RmgFO34cppyYrNx6LVBiOftmn+k1e:7PxY8te7UOOIOpjUZBV4+kI
Malware Config
Extracted
trickbot
1000276
sat77
92.38.149.25:443
94.181.47.198:449
31.31.161.165:449
158.69.177.176:443
181.113.17.230:449
212.23.70.149:443
91.201.65.89:443
170.81.32.66:449
42.115.91.177:443
54.39.167.242:443
71.94.101.25:443
68.45.243.125:449
192.252.209.44:443
182.50.64.148:449
187.190.249.230:443
107.175.127.147:443
82.222.40.119:449
198.100.157.163:443
23.226.138.169:443
103.110.91.118:449
31.179.162.86:443
202.137.121.14:449
98.177.188.224:449
103.111.53.126:449
105.27.171.234:449
182.253.20.66:449
71.13.140.89:443
5.104.41.188:443
46.149.182.112:449
37.235.251.150:449
62.141.94.107:443
115.78.3.170:443
197.232.50.85:443
94.232.20.113:443
190.145.74.84:449
47.49.168.50:443
110.232.86.52:449
68.109.83.22:443
-
autorunControl:GetSystemInfoName:systeminfoName:injectDll
Signatures
-
Trickbot family
-
Trickbot x86 loader 3 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
resource yara_rule behavioral1/memory/4236-0-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral1/memory/4236-19-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 behavioral1/memory/1044-22-0x0000000000400000-0x000000000043D000-memory.dmp trickbot_loader32 -
Executes dropped EXE 1 IoCs
pid Process 1044 dump.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\AIMY\dump.exe = "C:\\Users\\Admin\\AppData\\Roaming\\AIMY\\dump.exe" svchost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 ipinfo.io -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dump.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dump.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4236 wrote to memory of 1044 4236 dump.exe 86 PID 4236 wrote to memory of 1044 4236 dump.exe 86 PID 4236 wrote to memory of 1044 4236 dump.exe 86 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 PID 1044 wrote to memory of 3624 1044 dump.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dump.exe"C:\Users\Admin\AppData\Local\Temp\dump.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Roaming\AIMY\dump.exeC:\Users\Admin\AppData\Roaming\AIMY\dump.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Adds Run key to start application
PID:3624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233KB
MD51cc7c6a60a79a4eab229480c36198bdc
SHA1a99ba71c90aaaefacb5903d9a5e6169a514e8bcb
SHA256369630719d5f7f6714bc61344e957016716f88b96cfcecd9535b6c75fc17e827
SHA5120d262ab35901d16f42b53b7a631c6dd676e809a255d38b5a71d7af6f26c57fe53453cde67006330d91728c2918e6422134355083941e47c93bb7d1c1296011c6