Analysis
-
max time kernel
1774s -
max time network
1784s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-12-2020 15:58
Static task
static1
General
-
Target
2fccf27632f7bd48025d4b5a963722f7.exe
-
Size
491KB
-
MD5
2fccf27632f7bd48025d4b5a963722f7
-
SHA1
354daa8722c3ba2ea5b9365120e9a271a35eaef8
-
SHA256
2ae54dde3652a1cceef7ec5fcc8f2fdf5a07833fba685f0c0ee9964c5c2429d4
-
SHA512
6fd3c5301f8098cf1afb0d27631c67c54f161d085bc2e2d97799d5ae3c9cae96e1900e5122a2b92d2b68e69a595fac77280fdbccf17ac6acbb58163108b85bd4
Malware Config
Extracted
trickbot
1000514
forb2
51.89.163.40:443
89.223.126.186:443
45.67.231.68:443
148.251.185.165:443
194.87.110.144:443
213.32.84.27:443
185.234.72.35:443
45.89.125.148:443
195.123.240.104:443
185.99.2.243:443
5.182.211.223:443
195.123.240.113:443
85.204.116.173:443
5.152.210.188:443
103.36.48.103:449
36.94.33.102:449
36.91.87.227:449
177.190.69.162:449
103.76.169.213:449
179.97.246.23:449
200.24.67.161:449
181.143.186.42:449
190.99.97.42:449
179.127.88.41:449
117.252.214.138:449
117.222.63.145:449
45.224.213.234:449
45.237.241.97:449
125.165.20.104:449
-
autorunName:pwgrab
Signatures
-
Contacts Bazar domain
Uses Emercoin blockchain domains associated with Bazar backdoor/loader.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2fccf27632f7bd48025d4b5a963722f7.exepid process 1120 2fccf27632f7bd48025d4b5a963722f7.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 1656 wermgr.exe Token: SeDebugPrivilege 1656 wermgr.exe Token: SeDebugPrivilege 1656 wermgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2fccf27632f7bd48025d4b5a963722f7.exedescription pid process target process PID 1120 wrote to memory of 1656 1120 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1120 wrote to memory of 1656 1120 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1120 wrote to memory of 1656 1120 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1120 wrote to memory of 1656 1120 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1120 wrote to memory of 1656 1120 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe PID 1120 wrote to memory of 1656 1120 2fccf27632f7bd48025d4b5a963722f7.exe wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fccf27632f7bd48025d4b5a963722f7.exe"C:\Users\Admin\AppData\Local\Temp\2fccf27632f7bd48025d4b5a963722f7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken