Analysis
-
max time kernel
79s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:04
Static task
static1
Behavioral task
behavioral1
Sample
dsuifvhfdkj.exe
Resource
win7v20201028
General
-
Target
dsuifvhfdkj.exe
-
Size
552KB
-
MD5
b377527e76d5ba3b1d6a34605150b76c
-
SHA1
a4da8940dc7e616b0be71c254435a74350924c35
-
SHA256
77857312046d2a168e5c2ca3cd1465f6ad3fa4026b9e8792f03ccad038883826
-
SHA512
016d672ed1167de27e8ca5c1c1f3713ab5dc28120b7cf10fdbd7e608de2727e0a7b278c58d37aa619dc5a7d57114e33fe81300a36058c6bc54c4504dd20d4240
Malware Config
Extracted
trickbot
1000512
man7
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 1772 wermgr.exe Token: SeDebugPrivilege 1772 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
dsuifvhfdkj.exepid process 1876 dsuifvhfdkj.exe 1876 dsuifvhfdkj.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
dsuifvhfdkj.exedescription pid process target process PID 1876 wrote to memory of 1772 1876 dsuifvhfdkj.exe wermgr.exe PID 1876 wrote to memory of 1772 1876 dsuifvhfdkj.exe wermgr.exe PID 1876 wrote to memory of 1772 1876 dsuifvhfdkj.exe wermgr.exe PID 1876 wrote to memory of 1772 1876 dsuifvhfdkj.exe wermgr.exe PID 1876 wrote to memory of 1772 1876 dsuifvhfdkj.exe wermgr.exe PID 1876 wrote to memory of 1772 1876 dsuifvhfdkj.exe wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dsuifvhfdkj.exe"C:\Users\Admin\AppData\Local\Temp\dsuifvhfdkj.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-