Analysis

  • max time kernel
    144s
  • max time network
    151s
  • resource
    win7v191014

General

  • Target

    428f9a2b4cbc33879806996a030c02f0e60521b9

  • Sample

    191018-xkfwrmh4f2

  • SHA256

    6e25a2f2af3466370503b75f31440d1d48e10b89376f224bd1f4090ba8062710

Score
N/A

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Trickbot persistence files 1 IoCs
  • Modifies system certificate store 2 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs 26 IoCs
  • Drops file in system dir 20 IoCs
  • trickbot family

Processes

  • C:\Users\Admin\AppData\Local\Temp\428f9a2b4cbc33879806996a030c02f0e60521b9.exe
    "C:\Users\Admin\AppData\Local\Temp\428f9a2b4cbc33879806996a030c02f0e60521b9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    PID:300
  • C:\ProgramData\авоор.exe
    "C:\ProgramData\авоор.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    PID:2024
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe
    1⤵
    • Uses Task Scheduler COM API
    PID:1332
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {FA05A52C-C485-4A05-919C-E12E3B26FA59} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1952
  • C:\Users\Admin\AppData\Roaming\netRest\авоор.exe
    C:\Users\Admin\AppData\Roaming\netRest\авоор.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    PID:1136
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Trickbot persistence files
    • Modifies system certificate store
    • Uses Task Scheduler COM API
    • Drops file in system dir
    PID:1976

Network

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Additional techniques

  • T1130

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2024-4-0x0000000000510000-0x000000000053E000-memory.dmp

    Filesize

    184KB