Analysis
-
max time kernel
79s -
max time network
178s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
27-07-2021 17:02
Static task
static1
Behavioral task
behavioral1
Sample
compsBr.jpg.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
compsBr.jpg.dll
Resource
win10v20210410
General
-
Target
compsBr.jpg.dll
-
Size
401KB
-
MD5
91a92949ee2fef988e550dad8d82a9fe
-
SHA1
f96af4fec26ae74f0c87720511cd64a67537f5ea
-
SHA256
8b53679870df2d7562d34d026ff5fe3596071f267e951470cfe2a53778a730c6
-
SHA512
2641decbae7c73aa8f77c48a9e362f9862fdd0e9ae3799dc98f12a72d4e1cd0734e8ac0ebb3af08e90a7df5477b1b598752fc972c9b4344d878119a011e5a390
Malware Config
Extracted
trickbot
2000031
zev4
14.232.161.45:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 myexternalip.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 1384 wermgr.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1216 wrote to memory of 1076 1216 regsvr32.exe regsvr32.exe PID 1216 wrote to memory of 1076 1216 regsvr32.exe regsvr32.exe PID 1216 wrote to memory of 1076 1216 regsvr32.exe regsvr32.exe PID 1216 wrote to memory of 1076 1216 regsvr32.exe regsvr32.exe PID 1216 wrote to memory of 1076 1216 regsvr32.exe regsvr32.exe PID 1216 wrote to memory of 1076 1216 regsvr32.exe regsvr32.exe PID 1216 wrote to memory of 1076 1216 regsvr32.exe regsvr32.exe PID 1076 wrote to memory of 1384 1076 regsvr32.exe wermgr.exe PID 1076 wrote to memory of 1384 1076 regsvr32.exe wermgr.exe PID 1076 wrote to memory of 1384 1076 regsvr32.exe wermgr.exe PID 1076 wrote to memory of 1384 1076 regsvr32.exe wermgr.exe PID 1076 wrote to memory of 1384 1076 regsvr32.exe wermgr.exe PID 1076 wrote to memory of 1384 1076 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\compsBr.jpg.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\compsBr.jpg.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1076-61-0x0000000000000000-mapping.dmp
-
memory/1076-62-0x0000000075A71000-0x0000000075A73000-memory.dmpFilesize
8KB
-
memory/1076-63-0x0000000001D40000-0x0000000001DC0000-memory.dmpFilesize
512KB
-
memory/1076-64-0x0000000000270000-0x0000000000281000-memory.dmpFilesize
68KB
-
memory/1076-65-0x0000000010001000-0x0000000010003000-memory.dmpFilesize
8KB
-
memory/1216-60-0x000007FEFB9A1000-0x000007FEFB9A3000-memory.dmpFilesize
8KB
-
memory/1384-66-0x0000000000000000-mapping.dmp
-
memory/1384-67-0x0000000000060000-0x0000000000088000-memory.dmpFilesize
160KB
-
memory/1384-68-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB