Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
22-12-2020 12:26
Static task
static1
Behavioral task
behavioral1
Sample
2fccf27632f7bd48025d4b5a963722f7.exe
Resource
win7v20201028
General
-
Target
2fccf27632f7bd48025d4b5a963722f7.exe
-
Size
491KB
-
MD5
2fccf27632f7bd48025d4b5a963722f7
-
SHA1
354daa8722c3ba2ea5b9365120e9a271a35eaef8
-
SHA256
2ae54dde3652a1cceef7ec5fcc8f2fdf5a07833fba685f0c0ee9964c5c2429d4
-
SHA512
6fd3c5301f8098cf1afb0d27631c67c54f161d085bc2e2d97799d5ae3c9cae96e1900e5122a2b92d2b68e69a595fac77280fdbccf17ac6acbb58163108b85bd4
Malware Config
Extracted
trickbot
1000514
forb2
51.89.163.40:443
89.223.126.186:443
45.67.231.68:443
148.251.185.165:443
194.87.110.144:443
213.32.84.27:443
185.234.72.35:443
45.89.125.148:443
195.123.240.104:443
185.99.2.243:443
5.182.211.223:443
195.123.240.113:443
85.204.116.173:443
5.152.210.188:443
103.36.48.103:449
36.94.33.102:449
36.91.87.227:449
177.190.69.162:449
103.76.169.213:449
179.97.246.23:449
200.24.67.161:449
181.143.186.42:449
190.99.97.42:449
179.127.88.41:449
117.252.214.138:449
117.222.63.145:449
45.224.213.234:449
45.237.241.97:449
125.165.20.104:449
-
autorunName:pwgrab
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2fccf27632f7bd48025d4b5a963722f7.exepid process 1924 2fccf27632f7bd48025d4b5a963722f7.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 1724 wermgr.exe Token: SeDebugPrivilege 1724 wermgr.exe Token: SeDebugPrivilege 1724 wermgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2fccf27632f7bd48025d4b5a963722f7.exedescription pid process target process PID 1924 wrote to memory of 1724 1924 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1924 wrote to memory of 1724 1924 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1924 wrote to memory of 1724 1924 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1924 wrote to memory of 1724 1924 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1924 wrote to memory of 1724 1924 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1924 wrote to memory of 1724 1924 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fccf27632f7bd48025d4b5a963722f7.exe"C:\Users\Admin\AppData\Local\Temp\2fccf27632f7bd48025d4b5a963722f7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1724