Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
01-08-2020 19:30
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe
Resource
win7v200722
General
-
Target
SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe
-
Size
468KB
-
MD5
4e60a9173a3a8d675ae52029cfa5d859
-
SHA1
97b45930181fb6d66ce1102586fa96e8cfef4c0f
-
SHA256
ddc49d23ac1ee4f7a0f1f68c7661156557c3fae174077a50afb9a06b092550b8
-
SHA512
6c5e221013c7b6af837116f976d64fb7d67d1df2e9d339776296da907d120e2def20c9861d8ba0e908364b2d5ee294ae979b085d4f4910f6456648a96c203c6e
Malware Config
Extracted
trickbot
1000512
ono57
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.10349.11939.exepid process 3816 SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe 3816 SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed.140.10349.11939.exedescription pid process target process PID 3816 wrote to memory of 2120 3816 SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe wermgr.exe PID 3816 wrote to memory of 2120 3816 SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe wermgr.exe PID 3816 wrote to memory of 2120 3816 SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe wermgr.exe PID 3816 wrote to memory of 2120 3816 SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe wermgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 2120 wermgr.exe Token: SeDebugPrivilege 2120 wermgr.exe Token: SeDebugPrivilege 2120 wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Packed.140.10349.11939.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken