Analysis
-
max time kernel
72s -
max time network
168s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
27-07-2021 15:41
Static task
static1
Behavioral task
behavioral1
Sample
compsBr.jpg.dll
Resource
win7v20210410
Behavioral task
behavioral2
Sample
compsBr.jpg.dll
Resource
win10v20210410
General
-
Target
compsBr.jpg.dll
-
Size
490KB
-
MD5
67d7982f23537172833949505e2fc091
-
SHA1
0c1a40b42037d728c402eb4ea2c97a6837041dd3
-
SHA256
49e76568aab61959380480cc594d346207c88911d340fd17cf20a0405a42aded
-
SHA512
0990e6aa42f28f3b228a94d645ee5776d5126cb6d7bdd498e585e84c180567eac8c1817947caea3a5660464bd1d2efd7172cc0a72da72d00b148649ddde68d93
Malware Config
Extracted
trickbot
2000031
zev4
14.232.161.45:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 1216 wermgr.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1088 wrote to memory of 2028 1088 regsvr32.exe regsvr32.exe PID 1088 wrote to memory of 2028 1088 regsvr32.exe regsvr32.exe PID 1088 wrote to memory of 2028 1088 regsvr32.exe regsvr32.exe PID 1088 wrote to memory of 2028 1088 regsvr32.exe regsvr32.exe PID 1088 wrote to memory of 2028 1088 regsvr32.exe regsvr32.exe PID 1088 wrote to memory of 2028 1088 regsvr32.exe regsvr32.exe PID 1088 wrote to memory of 2028 1088 regsvr32.exe regsvr32.exe PID 2028 wrote to memory of 1216 2028 regsvr32.exe wermgr.exe PID 2028 wrote to memory of 1216 2028 regsvr32.exe wermgr.exe PID 2028 wrote to memory of 1216 2028 regsvr32.exe wermgr.exe PID 2028 wrote to memory of 1216 2028 regsvr32.exe wermgr.exe PID 2028 wrote to memory of 1216 2028 regsvr32.exe wermgr.exe PID 2028 wrote to memory of 1216 2028 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\compsBr.jpg.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\compsBr.jpg.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1088-59-0x000007FEFB881000-0x000007FEFB883000-memory.dmpFilesize
8KB
-
memory/1216-66-0x0000000000000000-mapping.dmp
-
memory/1216-67-0x0000000000060000-0x0000000000088000-memory.dmpFilesize
160KB
-
memory/1216-68-0x0000000000110000-0x0000000000111000-memory.dmpFilesize
4KB
-
memory/2028-60-0x0000000000000000-mapping.dmp
-
memory/2028-61-0x0000000075561000-0x0000000075563000-memory.dmpFilesize
8KB
-
memory/2028-62-0x0000000002030000-0x000000000228D000-memory.dmpFilesize
2.4MB
-
memory/2028-64-0x00000000001C0000-0x00000000001D1000-memory.dmpFilesize
68KB
-
memory/2028-63-0x00000000003A0000-0x0000000000420000-memory.dmpFilesize
512KB
-
memory/2028-65-0x0000000010001000-0x0000000010003000-memory.dmpFilesize
8KB