Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 10:06
Static task
static1
Behavioral task
behavioral1
Sample
fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe
Resource
win7v20201028
General
-
Target
fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe
-
Size
692KB
-
MD5
34da6a5c0f710bb913060171ae73d6b3
-
SHA1
0a2899b01777fa9f771ae1d58c4953a0659a29d7
-
SHA256
fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee
-
SHA512
9a3ae6f2e02e6636f87d5219e12510e57061b42308ad6de6a084f6de0c539eb1b360f2ace1a9d430afac87fe93dab2f2af8cb74d26b6ee674e3f08fa04aa8689
Malware Config
Extracted
trickbot
100009
lib6
149.54.11.54:449
36.89.191.119:449
41.159.31.227:449
103.150.68.124:449
103.126.185.7:449
103.112.145.58:449
103.110.53.174:449
102.164.208.44:449
194.5.249.143:443
142.202.191.175:443
195.123.241.31:443
45.89.125.214:443
45.83.151.103:443
91.200.103.41:443
66.70.246.0:443
64.74.160.218:443
198.46.198.115:443
5.34.180.173:443
23.227.196.5:443
195.123.241.115:443
107.152.42.163:443
-
autorunName:pwgrab
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exepid process 3040 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 checkip.amazonaws.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 2664 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exefc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exepid process 4052 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe 3040 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exefc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exedescription pid process target process PID 4052 wrote to memory of 3040 4052 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe PID 4052 wrote to memory of 3040 4052 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe PID 4052 wrote to memory of 3040 4052 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe PID 3040 wrote to memory of 2664 3040 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe wermgr.exe PID 3040 wrote to memory of 2664 3040 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe wermgr.exe PID 3040 wrote to memory of 2664 3040 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe wermgr.exe PID 3040 wrote to memory of 2664 3040 fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe"C:\Users\Admin\AppData\Local\Temp\fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Roaming\DesktopColor\fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exeC:\Users\Admin\AppData\Roaming\DesktopColor\fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2664
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\DesktopColor\fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exeMD5
34da6a5c0f710bb913060171ae73d6b3
SHA10a2899b01777fa9f771ae1d58c4953a0659a29d7
SHA256fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee
SHA5129a3ae6f2e02e6636f87d5219e12510e57061b42308ad6de6a084f6de0c539eb1b360f2ace1a9d430afac87fe93dab2f2af8cb74d26b6ee674e3f08fa04aa8689
-
C:\Users\Admin\AppData\Roaming\DesktopColor\fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee.exeMD5
34da6a5c0f710bb913060171ae73d6b3
SHA10a2899b01777fa9f771ae1d58c4953a0659a29d7
SHA256fc42215cfeadafe6b105e6bf26e05451dd2d5627e097f62f135787e2997652ee
SHA5129a3ae6f2e02e6636f87d5219e12510e57061b42308ad6de6a084f6de0c539eb1b360f2ace1a9d430afac87fe93dab2f2af8cb74d26b6ee674e3f08fa04aa8689
-
memory/2664-13-0x0000000000000000-mapping.dmp
-
memory/2664-15-0x0000024501FE0000-0x0000024501FE1000-memory.dmpFilesize
4KB
-
memory/2664-14-0x0000024501FA0000-0x0000024501FC7000-memory.dmpFilesize
156KB
-
memory/3040-5-0x0000000000000000-mapping.dmp
-
memory/3040-11-0x0000000059840000-0x0000000059841000-memory.dmpFilesize
4KB
-
memory/3040-10-0x00000000596C0000-0x00000000596C2000-memory.dmpFilesize
8KB
-
memory/3040-12-0x0000000059821000-0x0000000059823000-memory.dmpFilesize
8KB
-
memory/4052-4-0x0000000059800000-0x0000000059802000-memory.dmpFilesize
8KB