Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10_x64 -
resource
win10 -
submitted
01-08-2020 19:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe
Resource
win7
General
-
Target
SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe
-
Size
468KB
-
MD5
4dc0688fbd29c15390f2a07bb2a0d6ad
-
SHA1
73cc2d97cfadc9124492bfebc59c8b6d7f0afaa2
-
SHA256
758902befe3a96d2b61239b47134ba327129d10bf6bd0cc01565713f594a8bed
-
SHA512
a7625e3ac686c9c4e5d4f08ffa92c8c7a12e3e70bf8aad072b331c242d0272b1e7636d3a844046d90c6dc645b2bd456e23883b94d6fd34c782fb7d28b91fb9a7
Malware Config
Extracted
trickbot
1000512
ono57
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.17822.8517.exepid process 2920 SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe 2920 SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.17822.8517.exedescription pid process target process PID 2920 wrote to memory of 3792 2920 SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe wermgr.exe PID 2920 wrote to memory of 3792 2920 SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe wermgr.exe PID 2920 wrote to memory of 3792 2920 SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe wermgr.exe PID 2920 wrote to memory of 3792 2920 SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe wermgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 3792 wermgr.exe Token: SeDebugPrivilege 3792 wermgr.exe Token: SeDebugPrivilege 3792 wermgr.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 23 ident.me 22 ident.me
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.17822.8517.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken