Analysis
-
max time kernel
105s -
max time network
95s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
29-10-2020 14:11
Static task
static1
Behavioral task
behavioral1
Sample
printabledocx.dll
Resource
win7v20201028
General
-
Target
printabledocx.dll
-
Size
293KB
-
MD5
cbfb455108f9b2d783a66a6f9793352d
-
SHA1
7237c3b785c03e1d24ab64464b1c0ce00ef1a4bc
-
SHA256
210cddde479e8b524014a9bacf95299bc7287e342ee49a25d1eead62a6de3ce4
-
SHA512
1c7fed8a955d1747e824195fb7b13c5470ffded3c88714e6bd8512193f7042f7ca1ec7688d7b079a1a2148a20e01ed5b543b9abcf5b5aceb109410a94aa20315
Malware Config
Extracted
trickbot
1000513
chil103
51.89.177.20:443
194.5.249.174:443
107.174.196.242:443
185.205.209.241:443
82.146.46.220:443
5.34.178.126:443
212.22.70.65:443
195.123.241.90:443
185.164.32.214:443
198.46.198.139:443
195.123.241.187:443
86.104.194.116:443
195.123.240.252:443
185.164.32.215:443
45.148.120.195:443
45.138.158.32:443
5.149.253.99:443
92.62.65.163:449
88.247.212.56:449
180.211.170.214:449
186.159.8.218:449
158.181.155.153:449
27.147.173.227:449
103.130.114.106:449
103.221.254.102:449
187.109.119.99:449
220.247.174.12:449
183.81.154.113:449
121.101.185.130:449
200.116.159.183:449
200.116.232.186:449
103.87.169.150:449
180.211.95.14:449
103.36.48.103:449
45.127.222.8:449
112.109.19.178:449
36.94.33.102:449
110.232.249.13:449
177.190.69.162:449
-
autorunName:pwgrab
Signatures
-
Templ.dll packer 2 IoCs
Detects Templ.dll packer which usually loads Trickbot.
Processes:
resource yara_rule behavioral2/memory/2504-1-0x0000000003120000-0x000000000314E000-memory.dmp templ_dll behavioral2/memory/2504-2-0x0000000003150000-0x000000000317C000-memory.dmp templ_dll -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 552 wermgr.exe Token: SeDebugPrivilege 552 wermgr.exe Token: SeDebugPrivilege 552 wermgr.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1316 wrote to memory of 2504 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 2504 1316 regsvr32.exe regsvr32.exe PID 1316 wrote to memory of 2504 1316 regsvr32.exe regsvr32.exe PID 2504 wrote to memory of 552 2504 regsvr32.exe wermgr.exe PID 2504 wrote to memory of 552 2504 regsvr32.exe wermgr.exe PID 2504 wrote to memory of 552 2504 regsvr32.exe wermgr.exe PID 2504 wrote to memory of 552 2504 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\printabledocx.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\printabledocx.dll2⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-