Analysis
-
max time kernel
128s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-11-2020 12:22
Static task
static1
Behavioral task
behavioral1
Sample
3076ca9af343a0e9fa069c06c5f61672.exe
Resource
win7v20201028
General
-
Target
3076ca9af343a0e9fa069c06c5f61672.exe
-
Size
472KB
-
MD5
d88f41dca3cdf77703f870d93c039076
-
SHA1
b812c88adc08e31f516a0b43fe1e2d1d57c83a28
-
SHA256
471c8f897dbf91a3c94b8038d565f3887e5847c326da6a40ce840daf28991edf
-
SHA512
f6eddd3ee892a6ddaa0a26f92ee518994078ef14deb1a6ec0c69748b8e3ecc581097ef28cdc86f35b8b70b522708e3336630079024f4518c41522ad64a61bf8a
Malware Config
Extracted
trickbot
1000503
lib697
5.182.210.226:443
192.210.226.106:443
51.254.164.244:443
45.148.120.153:443
195.123.239.67:443
194.5.250.150:443
217.12.209.200:443
185.99.2.221:443
51.254.164.245:443
185.62.188.159:443
46.17.107.65:443
185.20.185.76:443
185.203.118.37:443
146.185.253.178:443
185.14.31.252:443
185.99.2.115:443
172.245.156.138:443
51.89.73.158:443
190.214.13.2:449
181.140.173.186:449
181.129.104.139:449
181.113.28.146:449
181.112.157.42:449
170.84.78.224:449
200.21.51.38:449
46.174.235.36:449
36.89.85.103:449
181.129.134.18:449
186.71.150.23:449
131.161.253.190:449
200.127.121.99:449
114.8.133.71:449
119.252.165.75:449
121.100.19.18:449
202.29.215.114:449
180.180.216.177:449
171.100.142.238:449
186.232.91.240:449
181.196.207.202:449
-
autorunName:pwgrab
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
3076ca9af343a0e9fa069c06c5f61672.exepid process 796 3076ca9af343a0e9fa069c06c5f61672.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 312 svchost.exe Token: SeDebugPrivilege 312 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
3076ca9af343a0e9fa069c06c5f61672.exe3076ca9af343a0e9fa069c06c5f61672.exepid process 988 3076ca9af343a0e9fa069c06c5f61672.exe 988 3076ca9af343a0e9fa069c06c5f61672.exe 796 3076ca9af343a0e9fa069c06c5f61672.exe 796 3076ca9af343a0e9fa069c06c5f61672.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
3076ca9af343a0e9fa069c06c5f61672.exe3076ca9af343a0e9fa069c06c5f61672.exedescription pid process target process PID 988 wrote to memory of 796 988 3076ca9af343a0e9fa069c06c5f61672.exe 3076ca9af343a0e9fa069c06c5f61672.exe PID 988 wrote to memory of 796 988 3076ca9af343a0e9fa069c06c5f61672.exe 3076ca9af343a0e9fa069c06c5f61672.exe PID 988 wrote to memory of 796 988 3076ca9af343a0e9fa069c06c5f61672.exe 3076ca9af343a0e9fa069c06c5f61672.exe PID 796 wrote to memory of 312 796 3076ca9af343a0e9fa069c06c5f61672.exe svchost.exe PID 796 wrote to memory of 312 796 3076ca9af343a0e9fa069c06c5f61672.exe svchost.exe PID 796 wrote to memory of 312 796 3076ca9af343a0e9fa069c06c5f61672.exe svchost.exe PID 796 wrote to memory of 312 796 3076ca9af343a0e9fa069c06c5f61672.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3076ca9af343a0e9fa069c06c5f61672.exe"C:\Users\Admin\AppData\Local\Temp\3076ca9af343a0e9fa069c06c5f61672.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\monolib\3076ca9af343a0e9fa069c06c5f61672.exeC:\Users\Admin\AppData\Roaming\monolib\3076ca9af343a0e9fa069c06c5f61672.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\monolib\3076ca9af343a0e9fa069c06c5f61672.exeMD5
d88f41dca3cdf77703f870d93c039076
SHA1b812c88adc08e31f516a0b43fe1e2d1d57c83a28
SHA256471c8f897dbf91a3c94b8038d565f3887e5847c326da6a40ce840daf28991edf
SHA512f6eddd3ee892a6ddaa0a26f92ee518994078ef14deb1a6ec0c69748b8e3ecc581097ef28cdc86f35b8b70b522708e3336630079024f4518c41522ad64a61bf8a
-
C:\Users\Admin\AppData\Roaming\monolib\3076ca9af343a0e9fa069c06c5f61672.exeMD5
d88f41dca3cdf77703f870d93c039076
SHA1b812c88adc08e31f516a0b43fe1e2d1d57c83a28
SHA256471c8f897dbf91a3c94b8038d565f3887e5847c326da6a40ce840daf28991edf
SHA512f6eddd3ee892a6ddaa0a26f92ee518994078ef14deb1a6ec0c69748b8e3ecc581097ef28cdc86f35b8b70b522708e3336630079024f4518c41522ad64a61bf8a
-
memory/312-11-0x0000000000000000-mapping.dmp
-
memory/312-13-0x000001F70D210000-0x000001F70D291000-memory.dmpFilesize
516KB
-
memory/796-4-0x0000000000000000-mapping.dmp
-
memory/988-3-0x0000000002A70000-0x0000000002AA1000-memory.dmpFilesize
196KB