Analysis
-
max time kernel
112s -
max time network
154s -
platform
windows10_x64 -
resource
win10 -
submitted
01-08-2020 19:32
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe
Resource
win7
General
-
Target
SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe
-
Size
468KB
-
MD5
d492e8185dfcea25ac1e6e44bc9be177
-
SHA1
4134a42e74f138f90b4e2e32244504e106cbb94d
-
SHA256
043e9c0e34b2bc276a58e6a9891b654eb776693daccb845c1cb2256c3ae51a1a
-
SHA512
1207d114ea5a4e95ebd0c1baf51438b8cb88f272ec0eab658865736849f382de2d2d1f18885defefa341fb0c5e99bda0784aca2f04285963bb8468fac79e6aba
Malware Config
Extracted
trickbot
1000512
ono57
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.10532.13715.exepid process 2728 SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe 2728 SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.10532.13715.exedescription pid process target process PID 2728 wrote to memory of 3888 2728 SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe wermgr.exe PID 2728 wrote to memory of 3888 2728 SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe wermgr.exe PID 2728 wrote to memory of 3888 2728 SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe wermgr.exe PID 2728 wrote to memory of 3888 2728 SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe wermgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 3888 wermgr.exe Token: SeDebugPrivilege 3888 wermgr.exe Token: SeDebugPrivilege 3888 wermgr.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 17 api.ipify.org
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.10532.13715.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken