| File name: | 2019-09-04-Trickbot-EXE-retrieved-by-Ursnif-infected-host.exe |
| Full analysis: | https://app.any.run/tasks/88796cbb-f436-4a10-a0df-abf51f03c38e |
| Verdict: | Malicious activity |
| Threats: | TrickBot is an advanced banking trojan that attackers can use to steal payment credentials from the victims. It can redirect the victim to a fake banking cabinet and retrieve credentials typed in on the webpage. |
| Analysis date: | March 25, 2025, 06:49:47 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | A6910A8A2FCD15D92E0683746CCB88AE |
| SHA1: | A3F21F0BA148CE7D571081BE0DC2FF796F152E24 |
| SHA256: | E2B08367810B17C0CDF55C6B697E3748CFF2766EB37D1FD519DB95C6548D7DBA |
| SSDEEP: | 12288:amdPsfvim1QcPEsjzoMa8i7AVsxv+XDDsA5AX++4qz:zEf/QOladNw/iX++Nz |
| .exe | | | Win64 Executable (generic) (49.4) |
|---|---|---|
| .scr | | | Windows screen saver (23.4) |
| .dll | | | Win32 Dynamic Link Library (generic) (11.7) |
| .exe | | | Win32 Executable (generic) (8) |
| .exe | | | Generic Win/DOS Executable (3.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2017:09:04 12:50:15+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 397824 |
| InitializedDataSize: | 334336 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1d0b |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 10.3.42.52 |
| ProductVersionNumber: | 10.3.42.52 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Forestsize Cogniance |
| FileDescription: | StopInstant |
| FileVersion: | 10.3.42.52 |
| InternalName: | StopInstant |
| LegalCopyright: | Copyright © 2004-2015 Forestsize Cogniance |
| LegalTrademarks: | StopInstant |
| ProductVersion: | 10.3.42.52 |
| OriginalFileName: | po.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1164 | C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} | C:\Windows\SysWOW64\dllhost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1760 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2340 | "C:\Users\admin\AppData\Local\Temp\2019-09-04-Trickbot-EXE-retrieved-by-Ursnif-infected-host.exe" | C:\Users\admin\AppData\Local\Temp\2019-09-04-Trickbot-EXE-retrieved-by-Ursnif-infected-host.exe | — | dllhost.exe | |||||||||||
User: admin Company: Forestsize Cogniance Integrity Level: HIGH Description: StopInstant Exit code: 0 Version: 10.3.42.52 Modules
| |||||||||||||||
| 4776 | "C:\Users\admin\AppData\Local\Temp\2019-09-04-Trickbot-EXE-retrieved-by-Ursnif-infected-host.exe" | C:\Users\admin\AppData\Local\Temp\2019-09-04-Trickbot-EXE-retrieved-by-Ursnif-infected-host.exe | — | explorer.exe | |||||||||||
User: admin Company: Forestsize Cogniance Integrity Level: MEDIUM Description: StopInstant Exit code: 0 Version: 10.3.42.52 Modules
| |||||||||||||||
| 5512 | "C:\Users\admin\AppData\Roaming\MsCloud\2019-09-04-Vticmbqt-EXE-tettieved-by-Wtupif-ipfected-hqut.exe" | C:\Users\admin\AppData\Roaming\MsCloud\2019-09-04-Vticmbqt-EXE-tettieved-by-Wtupif-ipfected-hqut.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Forestsize Cogniance Integrity Level: SYSTEM Description: StopInstant Exit code: 0 Version: 10.3.42.52 Modules
| |||||||||||||||
| 5548 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5640 | C:\WINDOWS\system32\svchost.exe | C:\Windows\System32\svchost.exe | 2019-09-04-Trickbot-EXE-retrieved-by-Ursnif-infected-host.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Host Process for Windows Services Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6036 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7148 | C:\WINDOWS\system32\svchost.exe | C:\Windows\System32\svchost.exe | 2019-09-04-Vticmbqt-EXE-tettieved-by-Wtupif-ipfected-hqut.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
TrickBot(PID) Process(7148) svchost.exe C2 srv (47)107.174.254.216:443 198.8.91.44:443 185.235.130.84:443 212.80.217.69:443 195.123.237.37:443 37.228.117.217:443 185.142.99.59:443 45.141.103.31:443 5.101.51.112:443 185.125.46.53:443 46.30.42.239:443 194.5.250.113:443 93.189.43.168:443 148.251.27.76:443 31.202.132.179:443 190.154.203.218:449 189.80.134.122:449 200.119.45.140:449 191.37.181.152:449 187.58.56.26:449 146.196.122.167:449 177.103.240.149:449 131.196.184.141:449 186.47.40.234:449 103.84.238.3:449 190.152.4.210:449 186.156.52.78:449 36.89.85.103:449 181.176.160.145:449 200.119.45.140:449 190.13.190.178:449 186.46.63.58:449 181.112.159.70:449 181.129.93.226:449 186.42.226.46:449 190.13.160.19:449 181.112.159.70:449 202.9.120.79:449 190.109.189.119:449 103.207.1.44:449 190.151.213.140:449 168.227.229.112:449 186.42.186.202:449 190.144.89.82:449 190.144.89.82:449 181.129.49.98:449 186.47.82.6:449 version1000467 Botnetleo11 KeyRUNTMzAAAADzIIbbIE3wcze1+xiwwK+Au/P78UrAO8YAHyPvHEwGVKOPphl8QVfrC7x/QaFYeXANw6E4HF7ietEp+7ZVQdWOx8c+HvO0Z2PTUPVbX9HAVrg4h9u1RNfhOHk+YysDLsg= Autorun module @namesysteminfo @ctlGetSystemInfo @nameinjectDll @namepwgrab other (203)checkip.amazonaws.com ipecho.net ipinfo.io api.ipify.org icanhazip.com myexternalip.com wtfismyip.com ip.anysrc.net api.ipify.org api.ip.sb ident.me www.myexternalip.com /plain /ip /raw /text /?format=text zen.spamhaus.org cbl.abuseat.org b.barracudacentral.org dnsbl-1.uceprotect.net spam.dnsbl.sorbs.net %s.%s user Data\ spk explorer.exe SeTcbPrivilege SINJ SYSTEM Ms Cloud Disk 0.0.0.0 %s %s %s.%s.%s.%s ECCPUBLICBLOB Microsoft Software Key Storage Provider GetProcAddress kernel32.dll %s%s noname %s/%s/63/%s/%s/%s/%s/ %s sTart ver.txt Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3731.0 Safari/537.36 tmp /%s/%s/1/%s/ /%s/%s/0/%s/%s/%s/%s/%s/ Win32 error Start failed Control failed </Command>
</Exec>
</Actions>
</Task> </Principal>
</Principals>
<Settings>
<MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>
<DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>
<StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>
<AllowHardTerminate>false</AllowHardTerminate>
<StartWhenAvailable>true</Sta... </UserId> <UserId> </StartBoundary>
<Enabled>true</Enabled>
</TimeTrigger>
</Triggers>
<Principals>
<Principal id="Author"> %04d-%02d-%02dT%02d:%02d:%02d <TimeTrigger>
<Repetition>
<Interval>PT11M</Interval>
<Duration>P414DT11H23M</Duration>
<StopAtDurationEnd>false</StopAtDurationEnd>
</Repetition>
<StartBoundary> </LogonTrigger> <LogonTrigger>
<Enabled>true</Enabled> </BootTrigger> <BootTrigger>
<Enabled>true</Enabled> <?xml version="1.0" encoding="UTF-16"?>
<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">
<RegistrationInfo>
<Version>1.0.0</Version>
<Author>AuthorName</Author>
<Description>Ms Cloud Disk</Description>
</RegistrationInfo>
<Triggers> <LogonType>InteractiveToken</LogonType>
<RunLevel>LeastPrivilege</RunLevel> <RunLevel>HighestAvailable</RunLevel>
<GroupId>NT AUTHORITY\SYSTEM</GroupId>
<LogonType>InteractiveToken</LogonType> path /%s/%s/10/%s/%s/%d/ %s%s_configs\ exc E: 0x%x A: 0x%p \MsCloud .tmp GET %u %u %u %u settings.ini Global\%08lX%04lX%lu Global\First <moduleconfig>*</moduleconfig> Module already unloaded working Process has been finished Process was unloaded Unable to load module from server GetParentInfo error release start Decode from BASE64 error Invalid params count No params /%s/%s/23/%d/ %02X winsta0\default SignatureLength ECDSA_P384 --%s-- --%s
Content-Disposition: form-data; name="%S" Content-Type: multipart/form-data; boundary=%s
Content-Length: %d ------Boundary%08X pIT NULL D:(A;;GA;;;WD)(A;;GA;;;BA)(A;;GA;;;SY)(A;;GA;;;RC) info data %s/%s/64/%s/%s/%s/ svchost.exe data\ VERS WantRelease ModuleQuery S-1-5-18 %d%d%d. fifty cmd.exe Register u failed, 0x%x Create xml2 failed Register s failed, 0x%x Create xml failed pIT GetFolder failed, 0x%x pIT connect failed, 0x%x LoadLibraryW UrlEscapeW shlwapi autorun Module is not valid Run D failed Create ZP failed Load to P failed Find P failed Module has already been loaded Launch USER failed Load to M failed /%s/%s/14/%s/%s/0/ LeaveCriticalSection EnterCriticalSection InitializeCriticalSection ExitProcess ResetEvent CloseHandle WaitForSingleObject SignalObjectAndWait /%s/%s/25/%s/ not listed listed DNSBL client is behind NAT failed NAT status client is not behind NAT Release FreeBuffer Control Start Windows Server 2008 R2 Windows Server 2008 Windows Server 2012 R2 Windows Server 2012 %s %s SP%d x86 x64 Unknown Windows 7 Windows 8.1 Windows 8 Windows XP Windows 2000 Windows 10 Server Windows Vista Windows Server 2003 Windows 10 WTSQueryUserToken WTSGetActiveConsoleSessionId WTSFreeMemory WTSEnumerateSessionsA wtsapi32 1068 POST /%s/%s/5/%s/ CI failed, 0x%x WINHTTP.dll bcrypt.dll USER32.dll ADVAPI32.dll ncrypt.dll WS2_32.dll SHLWAPI.dll USERENV.dll SHELL32.dll CRYPT32.dll IPHLPAPI.DLL OLEAUT32.dll ole32.dll ntdll.dll 5 @@ = %U*KG9!>b5yCXd#
] = = @ R# P: JD RW|B`P = 1 | |||||||||||||||
| (PID) Process: | (1164) dllhost.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer |
| Operation: | write | Name: | SlowContextMenuEntries |
Value: 6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5640 | svchost.exe | C:\Users\admin\AppData\Roaming\MsCloud\2019-09-04-Vticmbqt-EXE-tettieved-by-Wtupif-ipfected-hqut.exe | executable | |
MD5:A6910A8A2FCD15D92E0683746CCB88AE | SHA256:E2B08367810B17C0CDF55C6B697E3748CFF2766EB37D1FD519DB95C6548D7DBA | |||
| 7148 | svchost.exe | C:\Users\admin\AppData\Roaming\MsCloud\settings.ini | text | |
MD5:1BB9B3E320B1D910AB6F97B6A844480E | SHA256:52784139149764249578C511B9A6FE27593A8EC701163A3944AA919C6E72C0AF | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
2104 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
2112 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6036 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5548 | slui.exe | 40.91.76.224:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
7148 | svchost.exe | 37.228.117.217:443 | — | OOO Network of data-centers Selectel | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
dns.msftncsi.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
15.164.165.52.in-addr.arpa |
| unknown |
d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa |
| unknown |