Analysis
-
max time kernel
109s -
max time network
87s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-10-2020 14:11
Static task
static1
Behavioral task
behavioral1
Sample
printabledocx.dll
Resource
win7v20201028
General
-
Target
printabledocx.dll
-
Size
293KB
-
MD5
cbfb455108f9b2d783a66a6f9793352d
-
SHA1
7237c3b785c03e1d24ab64464b1c0ce00ef1a4bc
-
SHA256
210cddde479e8b524014a9bacf95299bc7287e342ee49a25d1eead62a6de3ce4
-
SHA512
1c7fed8a955d1747e824195fb7b13c5470ffded3c88714e6bd8512193f7042f7ca1ec7688d7b079a1a2148a20e01ed5b543b9abcf5b5aceb109410a94aa20315
Malware Config
Extracted
trickbot
1000513
chil103
51.89.177.20:443
194.5.249.174:443
107.174.196.242:443
185.205.209.241:443
82.146.46.220:443
5.34.178.126:443
212.22.70.65:443
195.123.241.90:443
185.164.32.214:443
198.46.198.139:443
195.123.241.187:443
86.104.194.116:443
195.123.240.252:443
185.164.32.215:443
45.148.120.195:443
45.138.158.32:443
5.149.253.99:443
92.62.65.163:449
88.247.212.56:449
180.211.170.214:449
186.159.8.218:449
158.181.155.153:449
27.147.173.227:449
103.130.114.106:449
103.221.254.102:449
187.109.119.99:449
220.247.174.12:449
183.81.154.113:449
121.101.185.130:449
200.116.159.183:449
200.116.232.186:449
103.87.169.150:449
180.211.95.14:449
103.36.48.103:449
45.127.222.8:449
112.109.19.178:449
36.94.33.102:449
110.232.249.13:449
177.190.69.162:449
-
autorunName:pwgrab
Signatures
-
Templ.dll packer 2 IoCs
Detects Templ.dll packer which usually loads Trickbot.
Processes:
resource yara_rule behavioral1/memory/1856-1-0x00000000001D0000-0x00000000001FE000-memory.dmp templ_dll behavioral1/memory/1856-2-0x0000000000210000-0x000000000023C000-memory.dmp templ_dll -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 2044 wermgr.exe Token: SeDebugPrivilege 2044 wermgr.exe Token: SeDebugPrivilege 2044 wermgr.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 684 wrote to memory of 1856 684 regsvr32.exe regsvr32.exe PID 684 wrote to memory of 1856 684 regsvr32.exe regsvr32.exe PID 684 wrote to memory of 1856 684 regsvr32.exe regsvr32.exe PID 684 wrote to memory of 1856 684 regsvr32.exe regsvr32.exe PID 684 wrote to memory of 1856 684 regsvr32.exe regsvr32.exe PID 684 wrote to memory of 1856 684 regsvr32.exe regsvr32.exe PID 684 wrote to memory of 1856 684 regsvr32.exe regsvr32.exe PID 1856 wrote to memory of 2044 1856 regsvr32.exe wermgr.exe PID 1856 wrote to memory of 2044 1856 regsvr32.exe wermgr.exe PID 1856 wrote to memory of 2044 1856 regsvr32.exe wermgr.exe PID 1856 wrote to memory of 2044 1856 regsvr32.exe wermgr.exe PID 1856 wrote to memory of 2044 1856 regsvr32.exe wermgr.exe PID 1856 wrote to memory of 2044 1856 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\printabledocx.dll1⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\printabledocx.dll2⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-