Resubmissions
17-01-2021 17:46
210117-3136fl8fba 1017-01-2021 17:07
210117-hja3svw3ca 1016-01-2021 12:09
210116-yfbgweax36 1016-01-2021 07:28
210116-bpcv3fv8fn 10Analysis
-
max time kernel
1655s -
max time network
1737s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-01-2021 17:46
Static task
static1
General
-
Target
b5ef0dd86a3fb068a1eef951a9e9bcd1.exe
-
Size
630KB
-
MD5
b5ef0dd86a3fb068a1eef951a9e9bcd1
-
SHA1
098e8b092629f8b1ab59d20b4ebbe39725b2064b
-
SHA256
b6af20ac6ddedad4f914bcb11c08e5399a4aadade16365bae3a5cb1611371e89
-
SHA512
45b1477ba4900eaae9731a5f182ff566ba1b9c023db5a0a251779956ea6c2167a4175c182d977b210ec056233237c31981a32593e089ac97418d656678e8fb73
Malware Config
Extracted
trickbot
100010
rob38
5.34.180.180:443
64.74.160.228:443
198.46.198.116:443
5.34.180.185:443
107.152.46.188:443
195.123.241.214:443
23.254.224.2:443
107.172.188.113:443
200.52.147.93:443
185.198.59.45:443
45.14.226.101:443
185.82.126.38:443
85.204.116.139:443
45.155.173.248:443
103.91.244.50:443
45.230.244.20:443
45.226.124.226:443
187.84.95.6:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
180.92.158.244:443
-
autorunName:pwgrab
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 10 checkip.amazonaws.com -
Drops file in System32 directory 1 IoCs
Processes:
wermgr.exedescription ioc process File created C:\Windows\system32\cn\lumhavkma.txt wermgr.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1804 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
svchost.exesvchost.exepid process 844 svchost.exe 844 svchost.exe 1216 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wermgr.exesvchost.exedescription pid process Token: SeDebugPrivilege 1212 wermgr.exe Token: SeDebugPrivilege 844 svchost.exe -
Suspicious use of WriteProcessMemory 852 IoCs
Processes:
b5ef0dd86a3fb068a1eef951a9e9bcd1.exewermgr.exedescription pid process target process PID 744 wrote to memory of 1372 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 744 wrote to memory of 1372 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 744 wrote to memory of 1372 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 744 wrote to memory of 1372 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 744 wrote to memory of 1212 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 744 wrote to memory of 1212 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 744 wrote to memory of 1212 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 744 wrote to memory of 1212 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 744 wrote to memory of 1212 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 744 wrote to memory of 1212 744 b5ef0dd86a3fb068a1eef951a9e9bcd1.exe wermgr.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe PID 1212 wrote to memory of 844 1212 wermgr.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5ef0dd86a3fb068a1eef951a9e9bcd1.exe"C:\Users\Admin\AppData\Local\Temp\b5ef0dd86a3fb068a1eef951a9e9bcd1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\ipconfig.exeipconfig /all4⤵
- Gathers network information
-
C:\Windows\system32\net.exenet config workstation4⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 config workstation5⤵
-
C:\Windows\system32\net.exenet view /all4⤵
- Discovers systems in the same network
-
C:\Windows\system32\net.exenet view /all /domain4⤵
- Discovers systems in the same network
-
C:\Windows\system32\nltest.exenltest /domain_trusts4⤵
-
C:\Windows\system32\nltest.exenltest /domain_trusts /all_trusts4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/744-2-0x0000000075E51000-0x0000000075E53000-memory.dmpFilesize
8KB
-
memory/744-3-0x0000000000230000-0x0000000000235000-memory.dmpFilesize
20KB
-
memory/744-4-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/744-5-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/744-6-0x0000000010001000-0x0000000010003000-memory.dmpFilesize
8KB
-
memory/844-10-0x0000000000000000-mapping.dmp
-
memory/844-12-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/1000-20-0x0000000000000000-mapping.dmp
-
memory/1212-8-0x0000000000060000-0x0000000000088000-memory.dmpFilesize
160KB
-
memory/1212-9-0x00000000000A0000-0x00000000000A1000-memory.dmpFilesize
4KB
-
memory/1212-7-0x0000000000000000-mapping.dmp
-
memory/1216-13-0x0000000000000000-mapping.dmp
-
memory/1488-18-0x0000000000000000-mapping.dmp
-
memory/1600-22-0x0000000000000000-mapping.dmp
-
memory/1804-16-0x0000000000000000-mapping.dmp
-
memory/1892-19-0x0000000000000000-mapping.dmp
-
memory/1996-17-0x0000000000000000-mapping.dmp
-
memory/2024-21-0x0000000000000000-mapping.dmp