Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
01-08-2020 19:35
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Packed.140.466.6381.exe
Resource
win7
General
-
Target
SecuriteInfo.com.Trojan.Packed.140.466.6381.exe
-
Size
468KB
-
MD5
f13e3c623e18ed05cd310410e6342274
-
SHA1
7af0f3a4edf29d800228fa9af797f4d8fbe960d0
-
SHA256
411f952b8afdd0778eff272360ca18b72058597c8fb454eb97320e5e87606a64
-
SHA512
cad0009ecf89b421cd57e0b4a91a1ed0dde4cfae0537a659f96a99be7c20f3d519d6462ddb9e94f1e02e4dcce8ea2b48aa87016acdc8a0cbb8d72b1e2b99bf15
Malware Config
Extracted
trickbot
1000512
ono57
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.466.6381.exedescription pid process target process PID 3908 wrote to memory of 2348 3908 SecuriteInfo.com.Trojan.Packed.140.466.6381.exe wermgr.exe PID 3908 wrote to memory of 2348 3908 SecuriteInfo.com.Trojan.Packed.140.466.6381.exe wermgr.exe PID 3908 wrote to memory of 2348 3908 SecuriteInfo.com.Trojan.Packed.140.466.6381.exe wermgr.exe PID 3908 wrote to memory of 2348 3908 SecuriteInfo.com.Trojan.Packed.140.466.6381.exe wermgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 2348 wermgr.exe Token: SeDebugPrivilege 2348 wermgr.exe Token: SeDebugPrivilege 2348 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.466.6381.exepid process 3908 SecuriteInfo.com.Trojan.Packed.140.466.6381.exe 3908 SecuriteInfo.com.Trojan.Packed.140.466.6381.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.466.6381.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.466.6381.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken