MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 60e3f1aa7f85ea1f92ad1415eb2fd129b790d84954a6537761be3e63338f2de7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 60e3f1aa7f85ea1f92ad1415eb2fd129b790d84954a6537761be3e63338f2de7
SHA3-384 hash: a501eb83d1f71b8ffc180a7f8fd9f484c3504a84ff6368f62b01dc5987790644f3bade723f4d34015c3f997dc1017065
SHA1 hash: 2cebca2f2eb7e24b8b5ad1a75acfbdc9fc6dadca
MD5 hash: 52d3254224b69b3ce75f3115619eb0d7
humanhash: sweet-alanine-hydrogen-white
File name:tru.dll
Download: download sample
File size:441'344 bytes
First seen:2021-08-18 13:44:44 UTC
Last seen:2021-08-18 17:37:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 6144:hh8rsk6YD+oR9XQPzllSJ23WQHcmMOjT/rCtWeOLI007rxqhy4ES5DGxa+7U0/t:hOtyPzzSQ3WEcXOHzt5INqntV+A
Threatray 21 similar samples on MalwareBazaar
TLSH T1A494AF27918C00D2F3CBBD7EAF5AB7B3E05AE65746076108713ADADBF3666994105303
Reporter Anonymous
Tags:exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
106
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Documents new.xlsb
Verdict:
Malicious activity
Analysis date:
2021-08-18 21:39:08 UTC
Tags:
macros40 loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.evad
Score:
92 / 100
Signature
Creates an autostart registry key pointing to binary in C:\Windows
Injects a PE file into a foreign processes
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Sigma detected: CobaltStrike Process Patterns
Sigma detected: Regsvr32 Anomaly
Sigma detected: UNC2452 Process Creation Patterns
Uses cmd line tools excessively to alter registry or file data
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 467514 Sample: tru.dll Startdate: 18/08/2021 Architecture: WINDOWS Score: 92 93 Multi AV Scanner detection for dropped file 2->93 95 Sigma detected: UNC2452 Process Creation Patterns 2->95 97 Sigma detected: CobaltStrike Process Patterns 2->97 99 Sigma detected: Regsvr32 Anomaly 2->99 10 loaddll64.exe 1 2->10         started        12 rundll32.exe 2->12         started        14 rundll32.exe 2->14         started        process3 process4 16 rundll32.exe 10->16         started        18 cmd.exe 1 10->18         started        21 regsvr32.exe 10->21         started        23 3 other processes 10->23 signatures5 25 cmd.exe 1 16->25         started        101 Uses ping.exe to sleep 18->101 103 Uses cmd line tools excessively to alter registry or file data 18->103 105 Uses ping.exe to check the status of other devices and networks 18->105 28 rundll32.exe 18->28         started        30 cmd.exe 1 21->30         started        33 iexplore.exe 5 146 23->33         started        process6 dnsIp7 119 Uses ping.exe to sleep 25->119 35 rundll32.exe 3 25->35         started        38 conhost.exe 25->38         started        40 PING.EXE 1 25->40         started        42 cmd.exe 28->42         started        45 cmd.exe 28->45         started        47 chrome.exe 28->47         started        85 127.0.0.1 unknown unknown 30->85 49 regsvr32.exe 30->49         started        51 conhost.exe 30->51         started        53 PING.EXE 1 30->53         started        87 tls13.taboola.map.fastly.net 151.101.1.44, 443, 49730, 49731 FASTLYUS United States 33->87 89 geolocation.onetrust.com 104.20.185.68, 443, 49716, 49717 CLOUDFLARENETUS United States 33->89 91 9 other IPs or domains 33->91 signatures8 process9 file10 83 C:\Users\user\AppData\Local\...\icoltekf.exe, PE32+ 35->83 dropped 55 cmd.exe 35->55         started        58 cmd.exe 35->58         started        60 cmd.exe 35->60         started        121 Uses cmd line tools excessively to alter registry or file data 42->121 62 conhost.exe 42->62         started        64 reg.exe 42->64         started        66 conhost.exe 45->66         started        68 reg.exe 45->68         started        signatures11 process12 signatures13 115 Uses ping.exe to sleep 55->115 70 rundll32.exe 55->70         started        73 conhost.exe 55->73         started        75 PING.EXE 55->75         started        117 Uses cmd line tools excessively to alter registry or file data 58->117 77 reg.exe 58->77         started        79 conhost.exe 58->79         started        81 conhost.exe 60->81         started        process14 signatures15 107 Writes to foreign memory regions 70->107 109 Modifies the context of a thread in another process (thread injection) 70->109 111 Injects a PE file into a foreign processes 70->111 113 Creates an autostart registry key pointing to binary in C:\Windows 77->113
Threat name:
Win64.Packed.Generic
Status:
Suspicious
First seen:
2021-08-18 13:45:12 UTC
AV detection:
6 of 28 (21.43%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
persistence
Behaviour
Modifies registry key
Runs ping.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Adds Run key to start application
Loads dropped DLL
Unpacked files
SH256 hash:
60e3f1aa7f85ea1f92ad1415eb2fd129b790d84954a6537761be3e63338f2de7
MD5 hash:
52d3254224b69b3ce75f3115619eb0d7
SHA1 hash:
2cebca2f2eb7e24b8b5ad1a75acfbdc9fc6dadca
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Distributed via e-mail link

Comments