Analysis
-
max time kernel
109s -
max time network
73s -
platform
windows7_x64 -
resource
win7 -
submitted
11-07-2020 06:13
Static task
static1
Behavioral task
behavioral1
Sample
992ecaa198bd84f1493c66aad56e5233.exe
Resource
win7
General
-
Target
992ecaa198bd84f1493c66aad56e5233.exe
-
Size
212KB
-
MD5
992ecaa198bd84f1493c66aad56e5233
-
SHA1
bfb6e6acd379099fa80f31fb158a816ca93d5f49
-
SHA256
55109a2a108c6539ef4528f9b5fe35ccfae40f86c9595f9b47e923e532d7331f
-
SHA512
0561ea07f49bcb9c3a18938bb52a1bd3c430206fa95c7b9427b896c8020207fe7937be224adc636b7f37aabadc17b406def6061867fef0dc69c72285b1d49750
Malware Config
Extracted
trickbot
1000512
ono55
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
992ecaa198bd84f1493c66aad56e5233.exedescription pid process target process PID 1032 wrote to memory of 316 1032 992ecaa198bd84f1493c66aad56e5233.exe wermgr.exe PID 1032 wrote to memory of 316 1032 992ecaa198bd84f1493c66aad56e5233.exe wermgr.exe PID 1032 wrote to memory of 316 1032 992ecaa198bd84f1493c66aad56e5233.exe wermgr.exe PID 1032 wrote to memory of 316 1032 992ecaa198bd84f1493c66aad56e5233.exe wermgr.exe PID 1032 wrote to memory of 316 1032 992ecaa198bd84f1493c66aad56e5233.exe wermgr.exe PID 1032 wrote to memory of 316 1032 992ecaa198bd84f1493c66aad56e5233.exe wermgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 316 wermgr.exe Token: SeDebugPrivilege 316 wermgr.exe Token: SeDebugPrivilege 316 wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\992ecaa198bd84f1493c66aad56e5233.exe"C:\Users\Admin\AppData\Local\Temp\992ecaa198bd84f1493c66aad56e5233.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:316