Analysis

  • max time kernel
    150s
  • max time network
    154s
  • resource
    win7v191014

General

  • Target

    41ed194a7310eae9620d1b4facfbc33fb246c079

  • Sample

    191018-h4wh8mye46

  • SHA256

    343d223fc1337edd9e8af65cda88fc6a616c9a16c7c11598675ed8b07cb7d790

Score
N/A

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Trickbot persistence files 1 IoCs
  • Drops file in system dir 12 IoCs
  • trickbot family
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41ed194a7310eae9620d1b4facfbc33fb246c079.exe
    "C:\Users\Admin\AppData\Local\Temp\41ed194a7310eae9620d1b4facfbc33fb246c079.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1412
  • C:\ProgramData\Нлкаи.exe
    "C:\ProgramData\Нлкаи.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    PID:1108
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe
    1⤵
    • Uses Task Scheduler COM API
    PID:2020
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {3E05DABE-CAC9-4A0F-A8CB-AD23375D66C0} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
  • C:\Users\Admin\AppData\Roaming\HomeLan\Нлкаи.exe
    C:\Users\Admin\AppData\Roaming\HomeLan\Нлкаи.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    PID:840
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Trickbot persistence files
    • Drops file in system dir
    • Uses Task Scheduler COM API
    PID:1128

Network

    No results found
  • 194.5.250.82:443
    194 B
    162 B
    3
    3
  • 190.13.160.19:449
    svchost.exe
    523 B
    1.6kB
    5
    4
  • 194.5.250.82:443
    svchost.exe
    194 B
    162 B
    3
    3
  • 194.5.250.82:443
    svchost.exe
    194 B
    162 B
    3
    3
  • 224.0.0.252:5355
    128 B
    2
  • 224.0.0.252:5355
    132 B
    2
  • 224.0.0.252:5355
    132 B
    2
  • 224.0.0.252:5355
    128 B
    2
  • 10.7.0.255:137
    1.9kB
    20
  • 224.0.0.252:5355
    132 B
    2
  • 239.255.255.250:1900
    1.1kB
    6
  • 239.255.255.250:1900
  • 224.0.0.22
    180 B
    3

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1108-4-0x00000000003B0000-0x00000000003DE000-memory.dmp

    Filesize

    184KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.