Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 18:10
Behavioral task
behavioral1
Sample
c3f53089ed25572ce22bdcc48ff8ffa008018f11e6b7ae0faa06d3d6b365d68c.exe
Resource
win7-20240903-en
General
-
Target
c3f53089ed25572ce22bdcc48ff8ffa008018f11e6b7ae0faa06d3d6b365d68c.exe
-
Size
100KB
-
MD5
78face6532ea097b73d507f3e06bbcac
-
SHA1
7bb03b4a49477e3972cafe3609d42a912ef6c770
-
SHA256
c3f53089ed25572ce22bdcc48ff8ffa008018f11e6b7ae0faa06d3d6b365d68c
-
SHA512
1d6536b0f2ad3349a4d7f7d44ce90da02524fb0ff9451cb2089cb046863cb1024b46c56f4f7615394626f554ae1e71f57ce3cb9441fa7040e66143f8c37787e1
-
SSDEEP
3072:ykszBKvtbJHYzfMbiGcfQaESRYIl6Q1TTi7:yksFKvgMb4fQCR76Q
Malware Config
Extracted
trickbot
1000451
ono9
172.245.241.25:443
91.235.129.212:443
195.123.233.162:443
193.124.176.170:443
206.217.143.91:443
23.94.137.179:443
23.94.137.223:443
198.46.190.37:443
92.38.171.12:443
195.123.246.2:443
89.105.203.180:443
104.193.252.147:443
195.133.196.102:443
185.252.144.213:443
195.133.144.87:443
78.155.206.85:443
190.154.203.218:449
189.80.134.122:449
125.99.253.34:449
191.37.181.152:449
187.58.56.26:449
146.196.122.167:449
177.103.240.149:449
131.196.184.141:449
103.117.232.198:449
163.53.80.228:449
190.152.4.210:449
138.59.233.5:449
36.89.85.103:449
146.196.122.152:449
170.84.78.186:449
131.255.82.24:449
186.138.152.228:449
180.250.197.188:449
181.129.93.226:449
186.42.226.46:449
190.13.160.19:449
186.183.199.114:449
177.8.172.86:449
181.129.140.140:449
103.87.48.66:449
177.52.79.29:449
168.227.229.112:449
186.42.186.202:449
138.121.24.78:449
131.0.142.120:449
181.129.49.98:449
181.115.168.69:449
-
autorunControl:GetSystemInfoName:systeminfoName:injectDllName:pwgrab
Signatures
-
Trickbot family
-
Executes dropped EXE 1 IoCs
pid Process 5092 c3f73089ed27792ce22bdcc48ff8ffa008018f11e8b9ae0faa08d3d8b387d88c.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3f53089ed25572ce22bdcc48ff8ffa008018f11e6b7ae0faa06d3d6b365d68c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3f73089ed27792ce22bdcc48ff8ffa008018f11e8b9ae0faa08d3d8b387d88c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 5092 c3f73089ed27792ce22bdcc48ff8ffa008018f11e8b9ae0faa08d3d8b387d88c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3f53089ed25572ce22bdcc48ff8ffa008018f11e6b7ae0faa06d3d6b365d68c.exe"C:\Users\Admin\AppData\Local\Temp\c3f53089ed25572ce22bdcc48ff8ffa008018f11e6b7ae0faa06d3d6b365d68c.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5128
-
C:\Users\Admin\AppData\Roaming\NetLibs14\c3f73089ed27792ce22bdcc48ff8ffa008018f11e8b9ae0faa08d3d8b387d88c.exeC:\Users\Admin\AppData\Roaming\NetLibs14\c3f73089ed27792ce22bdcc48ff8ffa008018f11e8b9ae0faa08d3d8b387d88c.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\NetLibs14\c3f73089ed27792ce22bdcc48ff8ffa008018f11e8b9ae0faa08d3d8b387d88c.exe
Filesize100KB
MD578face6532ea097b73d507f3e06bbcac
SHA17bb03b4a49477e3972cafe3609d42a912ef6c770
SHA256c3f53089ed25572ce22bdcc48ff8ffa008018f11e6b7ae0faa06d3d6b365d68c
SHA5121d6536b0f2ad3349a4d7f7d44ce90da02524fb0ff9451cb2089cb046863cb1024b46c56f4f7615394626f554ae1e71f57ce3cb9441fa7040e66143f8c37787e1