Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-11-2020 15:40
Static task
static1
Behavioral task
behavioral1
Sample
19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe
Resource
win7v20201028
General
-
Target
19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe
-
Size
332KB
-
MD5
5aa474d6a2ad892107496cb83a75c9de
-
SHA1
aa851e5b4b2fec802fbd7830633a0a264d1e4f25
-
SHA256
19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813
-
SHA512
9a47b785b658434636175192f02306a1f76861cb54fcd6baa3d95a4077aa7265d86a417c1667c93f0c83938378161b3313d681b32fec79242b4f335b9a1ead64
Malware Config
Extracted
trickbot
1000511
lib724
5.182.211.215:443
144.91.76.208:443
185.99.2.57:443
134.119.191.38:443
195.123.238.17:443
95.171.16.42:443
85.204.116.238:443
185.234.72.242:443
178.157.82.227:443
185.90.61.9:443
45.148.120.205:443
85.204.116.241:443
5.1.81.68:443
51.81.112.191:443
23.239.84.138:443
194.5.250.180:443
194.87.93.114:443
190.214.13.2:449
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
202.29.215.114:449
171.100.142.238:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
103.227.147.82:449
96.9.77.56:449
103.5.231.188:449
110.93.15.98:449
200.171.101.169:449
-
autorunName:pwgrab
Signatures
-
Dave packer 2 IoCs
Detects executable packed with a packer named 'Dave' from the community, due to a string at the end of it.
Processes:
resource yara_rule behavioral1/memory/1960-0-0x0000000000200000-0x000000000022D000-memory.dmp dave behavioral1/memory/1724-5-0x00000000001F0000-0x000000000021D000-memory.dmp dave -
Executes dropped EXE 1 IoCs
Processes:
19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exepid process 1724 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe -
Loads dropped DLL 1 IoCs
Processes:
19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exepid process 1960 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exepid process 1960 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe 1724 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exedescription pid process target process PID 1960 wrote to memory of 1724 1960 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe PID 1960 wrote to memory of 1724 1960 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe PID 1960 wrote to memory of 1724 1960 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe PID 1960 wrote to memory of 1724 1960 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe 19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe"C:\Users\Admin\AppData\Local\Temp\19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Roaming\CmdLineEx\19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exeC:\Users\Admin\AppData\Roaming\CmdLineEx\19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1724
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\CmdLineEx\19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exeMD5
5aa474d6a2ad892107496cb83a75c9de
SHA1aa851e5b4b2fec802fbd7830633a0a264d1e4f25
SHA25619cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813
SHA5129a47b785b658434636175192f02306a1f76861cb54fcd6baa3d95a4077aa7265d86a417c1667c93f0c83938378161b3313d681b32fec79242b4f335b9a1ead64
-
\Users\Admin\AppData\Roaming\CmdLineEx\19cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813.exeMD5
5aa474d6a2ad892107496cb83a75c9de
SHA1aa851e5b4b2fec802fbd7830633a0a264d1e4f25
SHA25619cd0e5a221a36279a046ef3dc2cfa90aca933c9a09a47bbf70a666e17556813
SHA5129a47b785b658434636175192f02306a1f76861cb54fcd6baa3d95a4077aa7265d86a417c1667c93f0c83938378161b3313d681b32fec79242b4f335b9a1ead64
-
memory/1724-3-0x0000000000000000-mapping.dmp
-
memory/1724-5-0x00000000001F0000-0x000000000021D000-memory.dmpFilesize
180KB
-
memory/1960-0-0x0000000000200000-0x000000000022D000-memory.dmpFilesize
180KB
-
memory/1960-1-0x0000000000370000-0x000000000039A000-memory.dmpFilesize
168KB