Analysis
-
max time kernel
66s -
max time network
179s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
29-06-2021 02:19
Static task
static1
Behavioral task
behavioral1
Sample
dCurTable.jpg.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
dCurTable.jpg.dll
Resource
win10v20210408
General
-
Target
dCurTable.jpg.dll
-
Size
3.0MB
-
MD5
6daccc54cd517e02c320ff14461ae729
-
SHA1
d6997e1f95b31701a75a2082528f23ec34b47003
-
SHA256
8368a955dd5d9850ed8ced6144a202368c52e065abafdb71a7960d3a90647e85
-
SHA512
f6940556982687110d64ecc6acfa20e89d929a896d4b7e2b974011db02b9a3aa18f6145425cace9690d7d859ee4f2b7f808ea8518a84d76a2050c7218ea28594
Malware Config
Extracted
trickbot
2000031
zev1
14.232.161.45:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 ident.me 12 ident.me -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 1228 wermgr.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 384 wrote to memory of 1468 384 regsvr32.exe regsvr32.exe PID 384 wrote to memory of 1468 384 regsvr32.exe regsvr32.exe PID 384 wrote to memory of 1468 384 regsvr32.exe regsvr32.exe PID 384 wrote to memory of 1468 384 regsvr32.exe regsvr32.exe PID 384 wrote to memory of 1468 384 regsvr32.exe regsvr32.exe PID 384 wrote to memory of 1468 384 regsvr32.exe regsvr32.exe PID 384 wrote to memory of 1468 384 regsvr32.exe regsvr32.exe PID 1468 wrote to memory of 1228 1468 regsvr32.exe wermgr.exe PID 1468 wrote to memory of 1228 1468 regsvr32.exe wermgr.exe PID 1468 wrote to memory of 1228 1468 regsvr32.exe wermgr.exe PID 1468 wrote to memory of 1228 1468 regsvr32.exe wermgr.exe PID 1468 wrote to memory of 1228 1468 regsvr32.exe wermgr.exe PID 1468 wrote to memory of 1228 1468 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\dCurTable.jpg.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\dCurTable.jpg.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/384-59-0x000007FEFBDC1000-0x000007FEFBDC3000-memory.dmpFilesize
8KB
-
memory/1228-66-0x0000000000000000-mapping.dmp
-
memory/1228-67-0x0000000000060000-0x0000000000088000-memory.dmpFilesize
160KB
-
memory/1228-68-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/1468-60-0x0000000000000000-mapping.dmp
-
memory/1468-61-0x0000000076661000-0x0000000076663000-memory.dmpFilesize
8KB
-
memory/1468-62-0x0000000010000000-0x0000000010037000-memory.dmpFilesize
220KB
-
memory/1468-63-0x0000000000170000-0x00000000001B3000-memory.dmpFilesize
268KB
-
memory/1468-64-0x00000000003E0000-0x00000000003F1000-memory.dmpFilesize
68KB
-
memory/1468-65-0x00000000001E1000-0x00000000001E3000-memory.dmpFilesize
8KB
-
memory/1468-69-0x0000000010000000-0x0000000010003000-memory.dmpFilesize
12KB