DEV Community

Mihika
Mihika

Posted on • Edited on

(Trickbot) Malware Analysis Report

This report provides a detailed analysis of malware.exe, Identified as the TrickBot Trojan.
TrickBot is a banking Trojan known for stealing payment credentials by redirecting victims to phishing websites. The malware is typically distributed via spearphishing emails. Those are typically attached in the form of malicious Microsoft Word or Excel files. One way of its spreading is by exploiting vulnerabilities in SMB, a protocol that allows Windows computers to easily share and access files and folders on other systems on the same network. Trickbot can be distributed through other malware.

Trickbot Infection Chain

Flowchart from a Trickbot infection

The Target System for this Analysis is Windows 10 Virtual Machine.

File : malware.exe , PE32 windows executable 32 bit GUI
original filename : MfcTTT.EXE
File size: 550 kb
sha256 Hash : 9FDEA40A9872A77335AE3B733A50F4D1E9F8EFF193AE84E36FB7E5802C481F72

Tagged as : Trickbot, banker, emotet, dropper

Tools used during Analysis HitmanPro, Process monitor, Wireshark, sysmon, Unpackme, Virustotal & other malware lookup and sandbox platform

VirusTotal Scan of malware.exe

VirusTotal result for malware.exe file. When this malware.exe was run, It created multiple copies of itself on different location, also detected by malware detector HitmanPro as seen in the figure below.

multiple copies of malware.exe dropped in the system

System scan with HitmanPro, detected copies of malware.exe

files were dropped at different location:
C:\ProgramData\аНаоすは래별.exe
C:\Users\Mihika\AppData\Roaming\NuiGet\аНаоすは래별.exe
C:\Users\Mihika\AppData\Roaming\NuiGet\oanwate.exe

As they are copies of same file malware.exe, hashes of these dropped files are exactly same.

Indicator of peristency:
Executable scheduled a task for command "C:\Users\Mihika\AppData\Roaming\NuiGet\аНаоすは래별.exe" to be triggered by boot & by time, one of the tactics by malware to stay persistent on the system or to conduct remote Execution as part of Lateral Movement, to gain system privileges.

A task was schedule to run аНаоすは래별.exe file at system startup

Although no changes in registry was found. The main executable, malware.exe queried many registry keys to gather information about the system, configuration, and installed software, some of regKey gives info related to:

  • It checks supported languages of target system.
  • checks user profiles, computer name, and session states.
  • checks regional and language configurations on the system.
  • Reads security settings of Internet Explore.
  • checks computer location settings.

the malware is using these registry queries to assess the system security configurations, language settings, compatibility modes, and file system behaviors to ensure it can run effectively, evade detection, and operate without interference from security features.

Process:

Process chart

Dropped Files:

PID Process Filename
8648 malware.exe C:\ProgramData\аНаоすは래별.exe
6400 svchost.exe C:\Users\Mihika\AppData\Roaming\NuiGet\settings.ini
1928 svchost.exe C:\Users\Mihika\AppData\Roaming\NuiGet\аНаоすは래별.exe
2508 аНаоすは래별.exe C:\ProgramData\Microsoft\Crypto\RSA\S-1-5-18\c12d0fde896f3644257b320067f915f0_305fb52e-58c2-4e89-9603-23058808ae91

Connections:
Several reconnection attempts by svchost.exe (PID: 6400) to

  • static-200-116-199-10.une.net.co:449
  • 185.222.202.76:https

IP address 185.222.202.76 is indicated as malicious on virustotal, and other online platforms, associated with trickbot.
Another connection attempts to static-200-116-199-10.une.net.co at port 449, also raise suspicion. The domain une.net.co is associated with a Colombian telecommunications company, UNE EPM Telecomunicaciones.
The IP 200.116.199.10 appears to belong to this network. Unusual connections to a non-standard port could indicate, Malicious activity like botnet communication or malware.

IOC (Indicator of Compromise)
File:
C:\ProgramData\аНаоすは래별.exe
C:\Users\OqXZRaykm\AppData\Roaming\NuiGet\аНаоすは래별.exe

malware.exe
IP:
200.116.199.10 : port 449
185.222.202.76

Mitigation Strategies
Block the IP 200.116.199.10 and port 449 in your firewall.
Block the IP 185.222.202.76

References:
Trickbot Infection in Network Traffic
How Malware can detect your Virtualisation environment

Top comments (0)