Analysis
-
max time kernel
89s -
max time network
138s -
platform
windows10_x64 -
resource
win10 -
submitted
01-08-2020 19:34
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe
Resource
win7
General
-
Target
SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe
-
Size
468KB
-
MD5
b7c00c44013156eb819069183f99bba9
-
SHA1
7c64c8c6dff74b5c44b070f0a69284b1edd6e86b
-
SHA256
39763b9851a6b87da54699ba9ed40e475fe9f6c8b07b0c7a43c914fbfa0b1f45
-
SHA512
a395245d17df4cf7735bcafc3c0b4cf873c4cbbe3a85ca68ec6d43a88abec5c4461a7e4fe9ead0c4362363e8a86635debca000513bbedd46c9e2271048dbcd90
Malware Config
Extracted
trickbot
1000512
ono57
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 ipinfo.io -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.25706.32002.exepid process 3876 SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe 3876 SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.25706.32002.exedescription pid process target process PID 3876 wrote to memory of 3496 3876 SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe wermgr.exe PID 3876 wrote to memory of 3496 3876 SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe wermgr.exe PID 3876 wrote to memory of 3496 3876 SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe wermgr.exe PID 3876 wrote to memory of 3496 3876 SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe wermgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 3496 wermgr.exe Token: SeDebugPrivilege 3496 wermgr.exe Token: SeDebugPrivilege 3496 wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.25706.32002.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken