Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- * ID: 822
- * MalFamily: "Trickbot"
- * MalScore: 10.0
- * File Name: "Exes_913ed59c6e5bd51454bdf733e3a2cd32.exe"
- * File Size: 602232
- * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
- * SHA256: "8d9186a4637dc720da61203bc7ba9c3da700895495806b181139ed7546f29b0a"
- * MD5: "913ed59c6e5bd51454bdf733e3a2cd32"
- * SHA1: "25ecf94543f32844b694b3607e883ebadd97d6af"
- * SHA512: "70c5d87c251ca8fa3f49d72ecd0d02e27a6fee4ca83121a9f418301dff09d5eb28fd485d6fea1aeee5e37b5ae1a0ea3625f42d0f0ec906d5fa595d243b26131f"
- * CRC32: "4F71103E"
- * SSDEEP: "12288:HoTBeHFMnV1mCVGEhSQpiVOnAZupYgp9JebiAiiIch7Ay:4EyV04QiAuK6Gh7Ay"
- * Process Execution:
- "nhd6Xl.exe",
- "\u0421\u043f\u0441\u043a\u0412\u0444\u041b\u044c\u0415\u0448\u0430.exe",
- "svchost.exe",
- "services.exe",
- "lsass.exe",
- "WmiApSrv.exe",
- "svchost.exe",
- "svchost.exe",
- "WerFault.exe",
- "wermgr.exe",
- "svchost.exe",
- "taskhost.exe",
- "WmiPrvSE.exe"
- * Executed Commands:
- "\"C:\\ProgramData\\\\xd0\\xa1\\xd0\\xbf\\xd1\\x81\\xd0\\xba\\xd0\\x92\\xd1\\x84\\xd0\\x9b\\xd1\\x8c\\xd0\\x95\\xd1\\x88\\xd0\\xb0.exe\"",
- "C:\\ProgramData\\\\xd0\\xa1\\xd0\\xbf\\xd1\\x81\\xd0\\xba\\xd0\\x92\\xd1\\x84\\xd0\\x9b\\xd1\\x8c\\xd0\\x95\\xd1\\x88\\xd0\\xb0.exe ",
- "C:\\Windows\\system32\\svchost.exe",
- "C:\\Windows\\system32\\lsass.exe",
- "C:\\Windows\\system32\\wbem\\WmiApSrv.exe",
- "C:\\Windows\\system32\\svchost.exe -k netsvcs",
- "C:\\Windows\\System32\\svchost.exe -k WerSvcGroup",
- "C:\\Windows\\system32\\WerFault.exe -u -p 2948 -s 416",
- "\"C:\\Windows\\system32\\wermgr.exe\" \"-queuereporting_svc\" \"C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\""
- * Signatures Detected:
- "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
- "Details":
- "Description": "Behavioural detection: Executable code extraction",
- "Details":
- "Description": "At least one process apparently crashed during execution",
- "Details":
- "Description": "Scheduled file move on reboot detected",
- "Details":
- "File Move on Reboot": "Old: C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\\Report.wer.tmp -> New: C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\\Report.wer"
- "Description": "Creates RWX memory",
- "Details":
- "Description": "Anomalous file deletion behavior detected (10+)",
- "Details":
- "DeletedFile": "C:\\Windows\\Temp\\WERC08C.tmp"
- "DeletedFile": "C:\\Windows\\Temp\\WERC08C.tmp.appcompat.txt"
- "DeletedFile": "C:\\Windows\\Temp\\WERC08C.tmp.appcompat.txt"
- "DeletedFile": "C:\\Windows\\Temp\\WERC65A.tmp"
- "DeletedFile": "C:\\Windows\\Temp\\WERC65A.tmp.WERInternalMetadata.xml"
- "DeletedFile": "C:\\Windows\\Temp\\WERC716.tmp"
- "DeletedFile": "C:\\Windows\\Temp\\WERC716.tmp.hdmp"
- "DeletedFile": "C:\\Windows\\Temp\\WERE955.tmp"
- "DeletedFile": "C:\\Windows\\Temp\\WERE955.tmp.mdmp"
- "DeletedFile": "C:\\Windows\\Temp\\WERC08C.tmp.appcompat.txt"
- "DeletedFile": "C:\\Windows\\Temp\\WERC65A.tmp.WERInternalMetadata.xml"
- "DeletedFile": "C:\\Windows\\Temp\\WERC716.tmp.hdmp"
- "DeletedFile": "C:\\Windows\\Temp\\WERE955.tmp.mdmp"
- "Description": "Guard pages use detected - possible anti-debugging.",
- "Details":
- "Description": "A process created a hidden window",
- "Details":
- "Process": "nhd6Xl.exe -> C:\\ProgramData\\\\xd0\\xa1\\xd0\\xbf\\xd1\\x81\\xd0\\xba\\xd0\\x92\\xd1\\x84\\xd0\\x9b\\xd1\\x8c\\xd0\\x95\\xd1\\x88\\xd0\\xb0.exe"
- "Description": "Performs some HTTP requests",
- "Details":
- "url_iocs": "http://ocsp2.globalsign.com/rootr3/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCDkgbagepQkweqv7zzfEP"
- "url_iocs": "http://ocsp2.globalsign.com/gsextendcodesignsha2g3/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQ3DAV9N6WelMGCzSTdNIqjdmfHiAQU3CxYLCpvNS2feZWoSF3EbT5Tv7kCDHfr3V5WznDoq7hrqg%3D%3D"
- "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
- "Details":
- "Spam": "services.exe (500) called API GetSystemTimeAsFileTime 11615711 times"
- "Description": "Likely virus infection of existing system binary",
- "Details":
- "file": "c:\\programdata\\\\xd0\\xa1\\xd0\\xbf\\xd1\\x81\\xd0\\xba\\xd0\\x92\\xd1\\x84\\xd0\\x9b\\xd1\\x8c\\xd0\\x95\\xd1\\x88\\xd0\\xb0.exe"
- "Description": "File has been identified by 14 Antiviruses on VirusTotal as malicious",
- "Details":
- "McAfee": "Artemis!913ED59C6E5B"
- "TrendMicro": "TrojanSpy.Win32.TRICKBOT.SMKA"
- "Symantec": "Trojan Horse"
- "ESET-NOD32": "a variant of Win32/GenKryptik.DRJL"
- "APEX": "Malicious"
- "DrWeb": "Trojan.DownLoad4.11971"
- "Invincea": "heuristic"
- "McAfee-GW-Edition": "Artemis"
- "Webroot": "W32.Trojan.Gen"
- "Fortinet": "W32/Kryptik.GVXY!tr"
- "Microsoft": "Trojan:Win32/TrickBot.I"
- "Panda": "Trj/GdSda.A"
- "TrendMicro-HouseCall": "TrojanSpy.Win32.TRICKBOT.SMKA"
- "Rising": "Dropper.Agent!8.2F (TFE:5:ABjGvFd6wvN)"
- "Description": "Checks the system manufacturer, likely for anti-virtualization",
- "Details":
- "Description": "Creates a copy of itself",
- "Details":
- "copy": "C:\\ProgramData\\\\xd0\\xa1\\xd0\\xbf\\xd1\\x81\\xd0\\xba\\xd0\\x92\\xd1\\x84\\xd0\\x9b\\xd1\\x8c\\xd0\\x95\\xd1\\x88\\xd0\\xb0.exe"
- * Started Service:
- "KeyIso",
- "WerSvc",
- "wmiApSrv"
- * Mutexes:
- "Global\\838B6C9EB27932960",
- "Global\\RefreshRA_Mutex_Lib",
- "Global\\RefreshRA_Mutex",
- "Global\\RefreshRA_Mutex_Flag",
- "Global\\WmiApSrv",
- "Local\\WERReportingForProcess2948",
- "Global\\\\xe5\\x88\\x90\\xc8\\xa2",
- "Global\\\\xed\\xa2\\xb0\\xcd\\x97",
- "WERUI_APPCRASH-e16fe751fc75722912cde99893a75155e1eb96"
- * Modified Files:
- "C:\\ProgramData\\\\xd0\\xa1\\xd0\\xbf\\xd1\\x81\\xd0\\xba\\xd0\\x92\\xd1\\x84\\xd0\\x9b\\xd1\\x8c\\xd0\\x95\\xd1\\x88\\xd0\\xb0.exe",
- "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-0000000000-0000000000-0000000000-1000\\00000000-0000-0000-0000-000000000000b_00000000-0000-0000-0000-000000000000",
- "C:\\Windows\\sysnative\\LogFiles\\Scm\\5869f1c1-01d7-41f7-84b7-715672259fa8",
- "\\??\\WMIDataDevice",
- "C:\\Windows\\Temp\\WERC08C.tmp.appcompat.txt",
- "C:\\Windows\\Temp\\WERC65A.tmp.WERInternalMetadata.xml",
- "C:\\Windows\\Temp\\WERC716.tmp.hdmp",
- "C:\\Windows\\Temp\\WERE955.tmp.mdmp",
- "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\\WERC08C.tmp.appcompat.txt",
- "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\\WERC65A.tmp.WERInternalMetadata.xml",
- "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\\WERC716.tmp.hdmp",
- "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\\WERE955.tmp.mdmp",
- "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\\Report.wer",
- "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\\Report.wer.tmp",
- "\\??\\PIPE\\samr",
- "C:\\Windows\\sysnative\\wbem\\repository\\WRITABLE.TST",
- "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING1.MAP",
- "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING2.MAP",
- "C:\\Windows\\sysnative\\wbem\\repository\\MAPPING3.MAP",
- "C:\\Windows\\sysnative\\wbem\\repository\\OBJECTS.DATA",
- "C:\\Windows\\sysnative\\wbem\\repository\\INDEX.BTR",
- "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2WMI SELF-INSTRUMENTATION EVENT PROVIDER",
- "\\??\\pipe\\PIPE_EVENTROOT\\CIMV2PROVIDERSUBSYSTEM"
- * Deleted Files:
- "C:\\Windows\\Temp\\WERC08C.tmp",
- "C:\\Windows\\Temp\\WERC08C.tmp.appcompat.txt",
- "C:\\Windows\\Temp\\WERC65A.tmp",
- "C:\\Windows\\Temp\\WERC65A.tmp.WERInternalMetadata.xml",
- "C:\\Windows\\Temp\\WERC716.tmp",
- "C:\\Windows\\Temp\\WERC716.tmp.hdmp",
- "C:\\Windows\\Temp\\WERE955.tmp",
- "C:\\Windows\\Temp\\WERE955.tmp.mdmp",
- "C:\\ProgramData\\Microsoft\\Windows\\WER\\ReportQueue\\AppCrash_svchost.exe_e16fe751fc75722912cde99893a75155e1eb96_cab_08673129\\Report.wer.tmp"
- * Modified Registry Keys:
- "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\wmiApSrv\\Type",
- "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Type",
- "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\WerSvc\\Type",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\PROVIDERS\\Performance\\Performance Refreshed",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ProcessID",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ThrottleDrege",
- "HKEY_LOCAL_MACHINE\\SYSTEM\\ControlSet001\\services\\Winmgmt\\Parameters\\ServiceDllUnloadOnStop",
- "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Debug",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\Windows Error Reporting\\Debug\\ExceptionRecord",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Consent",
- "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\Windows Error Reporting\\Consent\\DefaultConsent",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Debug",
- "HKEY_USERS\\.DEFAULT\\SOFTWARE\\Microsoft\\Windows\\Windows Error Reporting\\Debug\\StoreLocation",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\Windows Error Reporting\\Debug\\StoreLocation",
- "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\Windows Error Reporting\\Debug\\StoreLocation",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\LastServiceStart",
- "HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Wbem\\Transports\\Decoupled\\Server",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\CreationTime",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\MarshaledProxy",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\Transports\\Decoupled\\Server\\ProcessIdentifier",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\ConfigValueEssNeedsLoading",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\CIMOM\\List of event-active namespaces",
- "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WBEM\\ESS\\//./root/CIMV2\\SCM Event Provider"
- * Deleted Registry Keys:
- * DNS Communications:
- "type": "A",
- "request": "ocsp2.globalsign.com",
- "answers":
- "data": "151.101.66.133",
- "type": "A"
- "data": "151.101.2.133",
- "type": "A"
- "data": "global.prd.cdn.globalsign.com",
- "type": "CNAME"
- "data": "151.101.194.133",
- "type": "A"
- "data": "151.101.130.133",
- "type": "A"
- "data": "prod.globalsign.map.fastly.net",
- "type": "CNAME"
- * Domains:
- "ip": "104.18.20.226",
- "domain": "ocsp2.globalsign.com"
- * Network Communication - ICMP:
- * Network Communication - HTTP:
- "count": 1,
- "body": "",
- "uri": "http://ocsp2.globalsign.com/rootr3/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCDkgbagepQkweqv7zzfEP",
- "user-agent": "Microsoft-CryptoAPI/6.1",
- "method": "GET",
- "host": "ocsp2.globalsign.com",
- "version": "1.1",
- "path": "/rootr3/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCDkgbagepQkweqv7zzfEP",
- "data": "GET /rootr3/ME8wTTBLMEkwRzAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCDkgbagepQkweqv7zzfEP HTTP/1.1\r\nConnection: Keep-Alive\r\nAccept: */*\r\nUser-Agent: Microsoft-CryptoAPI/6.1\r\nHost: ocsp2.globalsign.com\r\n\r\n",
- "port": 80
- "count": 1,
- "body": "",
- "uri": "http://ocsp2.globalsign.com/gsextendcodesignsha2g3/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQ3DAV9N6WelMGCzSTdNIqjdmfHiAQU3CxYLCpvNS2feZWoSF3EbT5Tv7kCDHfr3V5WznDoq7hrqg%3D%3D",
- "user-agent": "Microsoft-CryptoAPI/6.1",
- "method": "GET",
- "host": "ocsp2.globalsign.com",
- "version": "1.1",
- "path": "/gsextendcodesignsha2g3/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQ3DAV9N6WelMGCzSTdNIqjdmfHiAQU3CxYLCpvNS2feZWoSF3EbT5Tv7kCDHfr3V5WznDoq7hrqg%3D%3D",
- "data": "GET /gsextendcodesignsha2g3/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQ3DAV9N6WelMGCzSTdNIqjdmfHiAQU3CxYLCpvNS2feZWoSF3EbT5Tv7kCDHfr3V5WznDoq7hrqg%3D%3D HTTP/1.1\r\nConnection: Keep-Alive\r\nAccept: */*\r\nUser-Agent: Microsoft-CryptoAPI/6.1\r\nHost: ocsp2.globalsign.com\r\n\r\n",
- "port": 80
- * Network Communication - SMTP:
- * Network Communication - Hosts:
- "country_name": "United States",
- "ip": "151.101.2.133",
- "inaddrarpa": "",
- "hostname": "ocsp2.globalsign.com"
- * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement