Analysis
-
max time kernel
84s -
max time network
140s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
17-10-2020 13:32
Static task
static1
General
-
Target
136b345a239295acc0329ae85463e0b249ee43f2409efef6b003dd31a10b40d6.vbe
-
Size
636KB
-
MD5
15810fb5f100a3a2d21e4c2288dc1a88
-
SHA1
834308004280f11a459f764d9e2339c34dc5d7f1
-
SHA256
136b345a239295acc0329ae85463e0b249ee43f2409efef6b003dd31a10b40d6
-
SHA512
431b31281a4b3d99fe2f9a0900a66b5eb9fc7deeae3394501fbc46ecd8d249415014f524f255a629d1f8ee3776d0b3cc8ff76d07beb7ec9c7c33632196ecaf87
Malware Config
Extracted
trickbot
1000514
ono76
51.89.163.40:443
89.223.126.186:443
45.67.231.68:443
148.251.185.165:443
194.87.110.144:443
213.32.84.27:443
185.234.72.35:443
45.89.125.148:443
195.123.240.104:443
185.99.2.243:443
5.182.211.223:443
195.123.240.113:443
85.204.116.173:443
5.152.210.188:443
103.36.48.103:449
36.94.33.102:449
36.91.87.227:449
177.190.69.162:449
103.76.169.213:449
179.97.246.23:449
200.24.67.161:449
181.143.186.42:449
190.99.97.42:449
179.127.88.41:449
117.252.214.138:449
117.222.63.145:449
45.224.213.234:449
45.237.241.97:449
125.165.20.104:449
-
autorunName:pwgrab
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1332 regsvr32.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D296971-108D-11EB-BA32-7EAB92A5770B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "309713532" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1392 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1392 iexplore.exe 1392 iexplore.exe 460 IEXPLORE.EXE 460 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
WScript.exeiexplore.exeregsvr32.exeregsvr32.exedescription pid process target process PID 1504 wrote to memory of 1776 1504 WScript.exe cmd.exe PID 1504 wrote to memory of 1776 1504 WScript.exe cmd.exe PID 1504 wrote to memory of 1776 1504 WScript.exe cmd.exe PID 1392 wrote to memory of 460 1392 iexplore.exe IEXPLORE.EXE PID 1392 wrote to memory of 460 1392 iexplore.exe IEXPLORE.EXE PID 1392 wrote to memory of 460 1392 iexplore.exe IEXPLORE.EXE PID 1392 wrote to memory of 460 1392 iexplore.exe IEXPLORE.EXE PID 1504 wrote to memory of 2020 1504 WScript.exe certutil.exe PID 1504 wrote to memory of 2020 1504 WScript.exe certutil.exe PID 1504 wrote to memory of 2020 1504 WScript.exe certutil.exe PID 1504 wrote to memory of 1100 1504 WScript.exe regsvr32.exe PID 1504 wrote to memory of 1100 1504 WScript.exe regsvr32.exe PID 1504 wrote to memory of 1100 1504 WScript.exe regsvr32.exe PID 1504 wrote to memory of 1100 1504 WScript.exe regsvr32.exe PID 1504 wrote to memory of 1100 1504 WScript.exe regsvr32.exe PID 1100 wrote to memory of 1332 1100 regsvr32.exe regsvr32.exe PID 1100 wrote to memory of 1332 1100 regsvr32.exe regsvr32.exe PID 1100 wrote to memory of 1332 1100 regsvr32.exe regsvr32.exe PID 1100 wrote to memory of 1332 1100 regsvr32.exe regsvr32.exe PID 1100 wrote to memory of 1332 1100 regsvr32.exe regsvr32.exe PID 1100 wrote to memory of 1332 1100 regsvr32.exe regsvr32.exe PID 1100 wrote to memory of 1332 1100 regsvr32.exe regsvr32.exe PID 1332 wrote to memory of 832 1332 regsvr32.exe wermgr.exe PID 1332 wrote to memory of 832 1332 regsvr32.exe wermgr.exe PID 1332 wrote to memory of 832 1332 regsvr32.exe wermgr.exe PID 1332 wrote to memory of 832 1332 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\136b345a239295acc0329ae85463e0b249ee43f2409efef6b003dd31a10b40d6.vbe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mkdir "C:\Drad\4.FoodPromotions\(1)PLANNING\(1)Projects\PromoAnnouncements\""2⤵
-
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -decodehex -f C:\Drad\ONKVD.dll C:\Drad\ONKVD.dll2⤵
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" c:\drad\ONKVD.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exec:\drad\ONKVD.dll3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Drad\ONKVD.dllMD5
faf55f62d1967375625d0e402c34ee0a
SHA102c8f9055c69a3386e7dbfd2eafad3beab3779fb
SHA256c2ced0e8bbda1c02a143cefa9f810f5e3131254d65ea39b027ed5db240f5d76e
SHA512227ee6b09e6897a0ea883c70f991e062dea0d80d3fc32e19676aea0c7d8c075269d811bd88c795cfdeca5bb81b7b6f0802db0f52d1931b1e6c2558139f4919ca
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0HO1P3U7.txtMD5
e8e28716cf9ec11d575d2a49e3f2d28b
SHA1d3e4bced8294e2d8c353728277b059c2f49270b6
SHA256ce804c5caf3e6d9e24f1c9ee066456df4973222f80c6123ae7f21a5b1bc0fb43
SHA512b225197130ea7fb80eb2153cf6ad96bf02ee48cf893b2a27ae327da7f8001a90f8a30b2f5bc391bade697f563ddacc75ba4ef371fa62df01c1e938bb81a71855
-
\??\c:\drad\ONKVD.dllMD5
0828f63b9396fead9231cae937694a37
SHA166f370b3a1dcfb9c87a31b35d2c0951a3b1612f8
SHA256fdfb6706e3f056404da1928a1a8dc3bce4ab4b8473f49e1c246b4ab2edc69ad4
SHA512dc34118892dfb58d22e888818b06c3f67307261238fb96eb9d75a2a2d88e761c07295cb6706a6783795d8365251bed83e91f1631cc86ca8ae16113156c561256
-
\Drad\ONKVD.dllMD5
0828f63b9396fead9231cae937694a37
SHA166f370b3a1dcfb9c87a31b35d2c0951a3b1612f8
SHA256fdfb6706e3f056404da1928a1a8dc3bce4ab4b8473f49e1c246b4ab2edc69ad4
SHA512dc34118892dfb58d22e888818b06c3f67307261238fb96eb9d75a2a2d88e761c07295cb6706a6783795d8365251bed83e91f1631cc86ca8ae16113156c561256
-
memory/460-2-0x0000000000000000-mapping.dmp
-
memory/1100-5-0x0000000000000000-mapping.dmp
-
memory/1332-11-0x0000000000260000-0x0000000000296000-memory.dmpFilesize
216KB
-
memory/1332-10-0x0000000000220000-0x0000000000257000-memory.dmpFilesize
220KB
-
memory/1332-8-0x0000000000000000-mapping.dmp
-
memory/1504-6-0x0000000002640000-0x0000000002644000-memory.dmpFilesize
16KB
-
memory/1776-0-0x0000000000000000-mapping.dmp
-
memory/1852-1-0x000007FEF7AD0000-0x000007FEF7D4A000-memory.dmpFilesize
2.5MB
-
memory/2020-3-0x0000000000000000-mapping.dmp