Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
01-08-2020 19:31
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe
Resource
win7
General
-
Target
SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe
-
Size
468KB
-
MD5
d77ca88b4eb91d701d6c5c9e06afe520
-
SHA1
d9fa42cafedd41fccf6d5272e23e3971b1d95207
-
SHA256
f86605c491663d4ba4210f8e7b270566c5823d6677e1c94f475bf336777a009c
-
SHA512
6a970bd7b7d9e3875efacdda31d09355eeeb6d0a71718144eff38826f90ac71c725ce13ba30fb92084c93c5fa209c4f9ed0b712ca28bf806bcb8c1bd20d4f9a9
Malware Config
Extracted
trickbot
1000512
ono57
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.16270.8220.exepid process 508 SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe 508 SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.16270.8220.exedescription pid process target process PID 508 wrote to memory of 2616 508 SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe wermgr.exe PID 508 wrote to memory of 2616 508 SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe wermgr.exe PID 508 wrote to memory of 2616 508 SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe wermgr.exe PID 508 wrote to memory of 2616 508 SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe wermgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 2616 wermgr.exe Token: SeDebugPrivilege 2616 wermgr.exe Token: SeDebugPrivilege 2616 wermgr.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 ipinfo.io
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.16270.8220.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken