Analysis
-
max time kernel
136s -
max time network
114s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 15:38
Static task
static1
Behavioral task
behavioral1
Sample
cursor.exe
Resource
win7
General
-
Target
cursor.exe
-
Size
436KB
-
MD5
5528cd078d8be65ac3a2fef4698e17b6
-
SHA1
f2ae7f86a62d4f75eeecca17f3a6e6143981a787
-
SHA256
2ec4d03398115ace6df9fe68fe3418d247926c97227e424fabff79522f350a72
-
SHA512
c2e8bb8bd42a7521eb59f90166594f2d0617129fd0222a97a400ffb42c663c9076eeeacd6e51fc9212336c5e4ddfc621db667ecd267ca28245e84f5ab36d579c
Malware Config
Extracted
trickbot
1000512
tot765
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cursor.exepid process 3848 cursor.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cursor.exedescription pid process target process PID 3848 wrote to memory of 416 3848 cursor.exe wermgr.exe PID 3848 wrote to memory of 416 3848 cursor.exe wermgr.exe PID 3848 wrote to memory of 416 3848 cursor.exe wermgr.exe PID 3848 wrote to memory of 416 3848 cursor.exe wermgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 416 wermgr.exe Token: SeDebugPrivilege 416 wermgr.exe Token: SeDebugPrivilege 416 wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cursor.exe"C:\Users\Admin\AppData\Local\Temp\cursor.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:416
-