Analysis

  • max time kernel
    132s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    02-12-2020 20:43

General

  • Target

    4135b0a92b446582588230a68d2bafe64196e41284a19c04de27be091513fe03.xls

  • Size

    62KB

  • MD5

    39eb52a7ff92ab88d45f9645f12c42e7

  • SHA1

    fa9c3ef6c474b90c67149a3be4bf6916fd48fb31

  • SHA256

    4135b0a92b446582588230a68d2bafe64196e41284a19c04de27be091513fe03

  • SHA512

    ed752b7f74863a962bd52753a6b4fc3d9f5887690a0ffeb05c5c76e10fb0433374ba43e084863cefaf52bc39ea0e71e2ebb4bd669bab9d764c996313f091fa47

Malware Config

Extracted

Family

trickbot

Version

100004

Botnet

rob12

C2

103.250.70.163:443

181.196.24.6:443

103.87.25.220:443

2.179.73.140:443

118.69.133.4:443

202.62.47.109:443

14.102.109.190:443

103.78.81.5:443

116.0.54.227:443

36.94.193.167:443

194.5.179.82:443

213.235.183.78:443

103.52.47.20:449

Attributes
  • autorun
    Name:pwgrab
ecc_pubkey.base64

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Loads dropped DLL 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\4135b0a92b446582588230a68d2bafe64196e41284a19c04de27be091513fe03.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 C:\LotWin\LotWin2\Horsew.dll,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Windows\system32\wermgr.exe
        C:\Windows\system32\wermgr.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1344

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\LotWin\LotWin2\Horsew.dll
    MD5

    6ba50bda02b9365981bccea9125e395a

    SHA1

    d636d8c87aa5fcd68b2cddaac5838a68812287f8

    SHA256

    6c8666b3b262f09600f20d751bd418f0e0d3a232e49b6c0cec75abb6f7174854

    SHA512

    af72b882a79476d008c912838f94ad5de2026235107f6baf842c86a88f8dd07ee67ccd475707090e556c2460f71cb172d7728babb41b1a048536a0716b485da0

  • \LotWin\LotWin2\Horsew.dll
    MD5

    6ba50bda02b9365981bccea9125e395a

    SHA1

    d636d8c87aa5fcd68b2cddaac5838a68812287f8

    SHA256

    6c8666b3b262f09600f20d751bd418f0e0d3a232e49b6c0cec75abb6f7174854

    SHA512

    af72b882a79476d008c912838f94ad5de2026235107f6baf842c86a88f8dd07ee67ccd475707090e556c2460f71cb172d7728babb41b1a048536a0716b485da0

  • \LotWin\LotWin2\Horsew.dll
    MD5

    6ba50bda02b9365981bccea9125e395a

    SHA1

    d636d8c87aa5fcd68b2cddaac5838a68812287f8

    SHA256

    6c8666b3b262f09600f20d751bd418f0e0d3a232e49b6c0cec75abb6f7174854

    SHA512

    af72b882a79476d008c912838f94ad5de2026235107f6baf842c86a88f8dd07ee67ccd475707090e556c2460f71cb172d7728babb41b1a048536a0716b485da0

  • \LotWin\LotWin2\Horsew.dll
    MD5

    6ba50bda02b9365981bccea9125e395a

    SHA1

    d636d8c87aa5fcd68b2cddaac5838a68812287f8

    SHA256

    6c8666b3b262f09600f20d751bd418f0e0d3a232e49b6c0cec75abb6f7174854

    SHA512

    af72b882a79476d008c912838f94ad5de2026235107f6baf842c86a88f8dd07ee67ccd475707090e556c2460f71cb172d7728babb41b1a048536a0716b485da0

  • \LotWin\LotWin2\Horsew.dll
    MD5

    6ba50bda02b9365981bccea9125e395a

    SHA1

    d636d8c87aa5fcd68b2cddaac5838a68812287f8

    SHA256

    6c8666b3b262f09600f20d751bd418f0e0d3a232e49b6c0cec75abb6f7174854

    SHA512

    af72b882a79476d008c912838f94ad5de2026235107f6baf842c86a88f8dd07ee67ccd475707090e556c2460f71cb172d7728babb41b1a048536a0716b485da0

  • memory/976-2-0x000007FEF6F80000-0x000007FEF71FA000-memory.dmp
    Filesize

    2.5MB

  • memory/1120-3-0x0000000000000000-mapping.dmp
  • memory/1120-9-0x00000000001B0000-0x00000000001E9000-memory.dmp
    Filesize

    228KB

  • memory/1120-10-0x0000000000250000-0x0000000000288000-memory.dmp
    Filesize

    224KB

  • memory/1344-11-0x0000000000000000-mapping.dmp