Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows10_x64 -
resource
win10 -
submitted
01-08-2020 19:32
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe
Resource
win7
General
-
Target
SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe
-
Size
468KB
-
MD5
99b1ed77119ba7de5de79b8886c5ecd0
-
SHA1
fcbeb4c1ed5de82d69fec4b1d33e873e681b9cc4
-
SHA256
989a7ba56ff5ec6102b95436b93d7bfa8e0fd3c5d4646882cea935421c5619fc
-
SHA512
3caae2a13cb421fe1a3c8f1c69fc738ad204db24a2c7441fb6297d6ea170194100c4542c1eb34c0d63708d2e9f47e7a0b124239732ed8018c84b3c3c1109178c
Malware Config
Extracted
trickbot
1000512
ono57
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.27041.19452.exepid process 3888 SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe 3888 SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.27041.19452.exedescription pid process target process PID 3888 wrote to memory of 4028 3888 SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe wermgr.exe PID 3888 wrote to memory of 4028 3888 SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe wermgr.exe PID 3888 wrote to memory of 4028 3888 SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe wermgr.exe PID 3888 wrote to memory of 4028 3888 SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe wermgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 4028 wermgr.exe Token: SeDebugPrivilege 4028 wermgr.exe Token: SeDebugPrivilege 4028 wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.27041.19452.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken