| File name: | 2019-09-05-Trickbot-gtag-leo12-retreived-by-Ursnif-infected-host.exe |
| Full analysis: | https://app.any.run/tasks/cdaa7ea3-d381-439e-9dbe-d0fae38b4a41 |
| Verdict: | Malicious activity |
| Threats: | TrickBot is an advanced banking trojan that attackers can use to steal payment credentials from the victims. It can redirect the victim to a fake banking cabinet and retrieve credentials typed in on the webpage. |
| Analysis date: | March 25, 2025, 07:03:58 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 80A228C94846B57D85C59D4EE87053F6 |
| SHA1: | CC9D94AA4D482B62F2543E1654F7C9E6B7A91EAF |
| SHA256: | 430A46259E925A073CA2AB724677F1CDCFC76514F2BEBFEE92397576807C42A0 |
| SSDEEP: | 24576:ziLsKpdgLtsZhxDcH7nG++rb6wx07eo6itF+tkFCvDpikvToNcn5F/NYG5T0pO/I:ziLsKpdgLtsZhxDcH7Z+rb6A07eo6itz |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2017:09:05 13:12:28+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 295936 |
| InitializedDataSize: | 599552 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x8f53 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 15.4.36.87 |
| ProductVersionNumber: | 15.4.36.87 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Rubfat Kitware |
| FileDescription: | RiverLittle |
| FileVersion: | 15.4.36.87 |
| InternalName: | RiverLittle |
| LegalCopyright: | Copyright © 2008-2018 Rubfat Kitware |
| LegalTrademarks: | RiverLittle |
| ProductVersion: | 15.4.36.87 |
| ProductName: | RiverLittle |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2392 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3956 | C:\WINDOWS\system32\svchost.exe | C:\Windows\System32\svchost.exe | 2019-09-05-Trickbot-gtag-leo12-retreived-by-Ursnif-infected-host.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Host Process for Windows Services Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4424 | "C:\Users\admin\AppData\Local\Temp\2019-09-05-Trickbot-gtag-leo12-retreived-by-Ursnif-infected-host.exe" | C:\Users\admin\AppData\Local\Temp\2019-09-05-Trickbot-gtag-leo12-retreived-by-Ursnif-infected-host.exe | — | explorer.exe | |||||||||||
User: admin Company: Rubfat Kitware Integrity Level: MEDIUM Description: RiverLittle Exit code: 0 Version: 15.4.36.87 Modules
| |||||||||||||||
| 5304 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5400 | C:\WINDOWS\system32\svchost.exe | C:\Windows\System32\svchost.exe | 2019-09-07-Vticmbqt-gtag-neq12-tetteived-by-Wtupif-ipfected-hqut.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
TrickBot(PID) Process(5400) svchost.exe C2 srv (47)107.174.254.216:443 198.8.91.44:443 185.235.130.84:443 212.80.217.69:443 195.123.237.37:443 37.228.117.217:443 185.142.99.59:443 45.141.103.31:443 5.101.51.112:443 185.125.46.53:443 46.30.42.239:443 194.5.250.113:443 93.189.43.168:443 148.251.27.76:443 31.202.132.179:443 190.154.203.218:449 189.80.134.122:449 200.119.45.140:449 191.37.181.152:449 187.58.56.26:449 146.196.122.167:449 177.103.240.149:449 131.196.184.141:449 186.47.40.234:449 103.84.238.3:449 190.152.4.210:449 186.156.52.78:449 36.89.85.103:449 181.176.160.145:449 200.119.45.140:449 190.13.190.178:449 186.46.63.58:449 181.112.159.70:449 181.129.93.226:449 186.42.226.46:449 190.13.160.19:449 181.112.159.70:449 202.9.120.79:449 190.109.189.119:449 103.207.1.44:449 190.151.213.140:449 168.227.229.112:449 186.42.186.202:449 190.144.89.82:449 190.144.89.82:449 181.129.49.98:449 186.47.82.6:449 version1000467 Botnetleo12 KeyRUNTMzAAAADzIIbbIE3wcze1+xiwwK+Au/P78UrAO8YAHyPvHEwGVKOPphl8QVfrC7x/QaFYeXANw6E4HF7ietEp+7ZVQdWOx8c+HvO0Z2PTUPVbX9HAVrg4h9u1RNfhOHk+YysDLsg= Autorun module @namesysteminfo @ctlGetSystemInfo @nameinjectDll @namepwgrab other (202)checkip.amazonaws.com ipecho.net ipinfo.io api.ipify.org icanhazip.com myexternalip.com wtfismyip.com ip.anysrc.net api.ipify.org api.ip.sb ident.me www.myexternalip.com /plain /ip /raw /text /?format=text zen.spamhaus.org cbl.abuseat.org b.barracudacentral.org dnsbl-1.uceprotect.net spam.dnsbl.sorbs.net \MsCloud data\ %s%s CI failed, 0x%x pIT NULL POST %s.%s.%s.%s info data %s/%s/64/%s/%s/%s/ /%s/%s/25/%s/ Data\ Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3731.0 Safari/537.36 /%s/%s/23/%d/ /%s/%s/5/%s/ <moduleconfig>*</moduleconfig> /%s/%s/1/%s/ --%s-- --%s
Content-Disposition: form-data; name="%S" Content-Type: multipart/form-data; boundary=%s
Content-Length: %d ------Boundary%08X D:(A;;GA;;;WD)(A;;GA;;;BA)(A;;GA;;;SY)(A;;GA;;;RC) tmp Register u failed, 0x%x Create xml2 failed Register s failed, 0x%x user Ms Cloud Disk Create xml failed pIT GetFolder failed, 0x%x pIT connect failed, 0x%x SYSTEM GET SignatureLength ECCPUBLICBLOB ECDSA_P384 path winsta0\default SeTcbPrivilege 1068 not listed listed DNSBL client is behind NAT failed NAT status client is not behind NAT %s%s_configs\ /%s/%s/0/%s/%s/%s/%s/%s/ %d%d%d. ver.txt %s %s .tmp fifty cmd.exe SINJ S-1-5-18 Module already unloaded working Start failed Process has been finished Process was unloaded Unable to load module from server GetParentInfo error Win32 error release start Decode from BASE64 error Invalid params count No params Microsoft Software Key Storage Provider /%s/%s/10/%s/%s/%d/ WTSQueryUserToken WTSGetActiveConsoleSessionId WTSFreeMemory WTSEnumerateSessionsA wtsapi32 exc E: 0x%x A: 0x%p Control failed spk %s.%s UrlEscapeW shlwapi svchost.exe %s sTart %u %u %u %u settings.ini Release FreeBuffer Control Start 0.0.0.0 </Command>
</Exec>
</Actions>
</Task> </Principal>
</Principals>
<Settings>
<MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
<DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
<StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
<AllowHardTerminate>false</AllowHardTerminate>
<StartWhenAvailable>true</Sta... </UserId> <UserId> </StartBoundary>
<Enabled>true</Enabled>
</TimeTrigger>
</Triggers>
<Principals>
<Principal id="Author"> %04d-%02d-%02dT%02d:%02d:%02d <TimeTrigger>
<Repetition>
<Interval>PT11M</Interval>
<Duration>P414DT11H23M</Duration>
<StopAtDurationEnd>false</StopAtDurationEnd>
</Repetition>
<StartBoundary> </LogonTrigger> <LogonTrigger>
<Enabled>true</Enabled> </BootTrigger> <BootTrigger>
<Enabled>true</Enabled> <?xml version="1.0" encoding="UTF-16"?>
<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
<RegistrationInfo>
<Version>1.0.0</Version>
<Author>AuthorName</Author>
<Description>Ms Cloud Disk</Description>
</RegistrationInfo>
<Triggers> <LogonType>InteractiveToken</LogonType>
<RunLevel>LeastPrivilege</RunLevel> <RunLevel>HighestAvailable</RunLevel>
<GroupId>NT AUTHORITY\SYSTEM</GroupId>
<LogonType>InteractiveToken</LogonType> %02X autorun Windows Server 2008 R2 Windows Server 2008 Windows Server 2012 R2 Windows Server 2012 %s %s SP%d x86 x64 Unknown Windows 7 Windows 8.1 Windows 8 Windows XP Windows 2000 Windows 10 Server Windows Vista Windows Server 2003 Windows 10 explorer.exe LeaveCriticalSection EnterCriticalSection InitializeCriticalSection ExitProcess ResetEvent CloseHandle WaitForSingleObject SignalObjectAndWait kernel32.dll LoadLibraryW noname %s/%s/63/%s/%s/%s/%s/ GetProcAddress Run D failed Create ZP failed Load to P failed Find P failed Module has already been loaded Launch USER failed Load to M failed Module is not valid VERS WantRelease ModuleQuery /%s/%s/14/%s/%s/0/ Global\%08lX%04lX%lu Global\First WS2_32.dll IPHLPAPI.DLL ADVAPI32.dll WINHTTP.dll USER32.dll SHLWAPI.dll USERENV.dll ntdll.dll ncrypt.dll SHELL32.dll bcrypt.dll CRYPT32.dll ole32.dll OLEAUT32.dll = a = = ! R# Pr B = @F F = | |||||||||||||||
| 5528 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5892 | "C:\Users\admin\AppData\Local\Temp\2019-09-05-Trickbot-gtag-leo12-retreived-by-Ursnif-infected-host.exe" | C:\Users\admin\AppData\Local\Temp\2019-09-05-Trickbot-gtag-leo12-retreived-by-Ursnif-infected-host.exe | — | dllhost.exe | |||||||||||
User: admin Company: Rubfat Kitware Integrity Level: HIGH Description: RiverLittle Exit code: 0 Version: 15.4.36.87 Modules
| |||||||||||||||
| 6272 | C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} | C:\Windows\SysWOW64\dllhost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6512 | "C:\Users\admin\AppData\Roaming\MsCloud\2019-09-07-Vticmbqt-gtag-neq12-tetteived-by-Wtupif-ipfected-hqut.exe" | C:\Users\admin\AppData\Roaming\MsCloud\2019-09-07-Vticmbqt-gtag-neq12-tetteived-by-Wtupif-ipfected-hqut.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Rubfat Kitware Integrity Level: SYSTEM Description: RiverLittle Exit code: 0 Version: 15.4.36.87 Modules
| |||||||||||||||
| (PID) Process: | (6272) dllhost.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3956 | svchost.exe | C:\Users\admin\AppData\Roaming\MsCloud\2019-09-07-Vticmbqt-gtag-neq12-tetteived-by-Wtupif-ipfected-hqut.exe | executable | |
MD5:80A228C94846B57D85C59D4EE87053F6 | SHA256:430A46259E925A073CA2AB724677F1CDCFC76514F2BEBFEE92397576807C42A0 | |||
| 5400 | svchost.exe | C:\Users\admin\AppData\Roaming\MsCloud\settings.ini | text | |
MD5:F9FA89496FCD5E4B6FE978E0EACCBF75 | SHA256:C08B715F9D34C46C9D1B930EFAF792714E8566404C60CB3C5CAD561B342DA943 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2112 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5304 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
2392 | slui.exe | 20.83.72.98:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5400 | svchost.exe | 212.80.217.69:443 | — | Serverius Holding B.V. | NL | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
dns.msftncsi.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
171.39.242.20.in-addr.arpa |
| unknown |
4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa |
| unknown |