Resubmissions

19-08-2021 14:54

210819-1m2h3hyp5a 10

16-07-2021 10:15

210716-ghza71m1ks 10

Analysis

  • max time kernel
    1798s
  • max time network
    1832s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    19-08-2021 14:54

General

  • Target

    referenceSet.jpg.dll

  • Size

    594KB

  • MD5

    fbbc24f5345b11b35b8f0b68c9d30caa

  • SHA1

    13a5fd90f3dbc9797a59cf924aa7c6bdc35cacdf

  • SHA256

    bcdac7b40846874f002e6f59413a381e4ae13bf7181eae60203c0ae69f799a57

  • SHA512

    6f05c0d78a7e01e8659410c513a7852709d53db36d885c3a4a32bf8e089cc7cbeab0d129cf669991c779a488ffa515ea2d0ebe49ca03e7881d36ebbc09b13faa

Malware Config

Extracted

Family

trickbot

Version

2000031

Botnet

zev1

C2

14.232.161.45:443

118.173.233.64:443

41.57.156.203:443

45.239.234.2:443

45.201.136.3:443

177.10.90.29:443

185.17.105.236:443

91.237.161.87:443

185.189.55.207:443

186.225.119.170:443

143.0.208.20:443

222.124.16.74:443

220.82.64.198:443

200.236.218.62:443

178.216.28.59:443

45.239.233.131:443

196.216.59.174:443

119.202.8.249:443

82.159.149.37:443

49.248.217.170:443

Attributes
  • autorun
    Name:pwgrabb
    Name:pwgrabc
ecc_pubkey.base64

Extracted

Family

trickbot

Version

2000032

Botnet

tot141

C2

103.122.228.44:443

196.216.220.211:443

181.114.215.239:443

41.57.156.203:443

43.252.159.63:443

197.156.129.250:443

113.160.37.196:443

38.110.100.64:443

113.160.132.237:443

24.28.12.23:443

38.110.100.219:443

45.239.233.109:443

119.202.8.249:443

200.236.218.62:443

220.82.64.198:443

190.93.208.53:443

196.216.59.174:443

222.124.16.74:443

202.165.47.106:443

96.9.77.56:443

Attributes
  • autorun
    Name:pwgrabb
    Name:pwgrabc
ecc_pubkey.base64

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • suricata: ET MALWARE Trickbot Checkin Response

    suricata: ET MALWARE Trickbot Checkin Response

  • Blocklisted process makes network request 25 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Discovers systems in the same network 1 TTPs 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\referenceSet.jpg.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\referenceSet.jpg.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\system32\wermgr.exe
        C:\Windows\system32\wermgr.exe
        3⤵
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1532
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1780
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe
          4⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          PID:1264
          • C:\Windows\system32\cmd.exe
            /c ipconfig /all
            5⤵
              PID:1372
              • C:\Windows\system32\ipconfig.exe
                ipconfig /all
                6⤵
                • Gathers network information
                PID:544
            • C:\Windows\system32\cmd.exe
              /c net config workstation
              5⤵
                PID:1096
                • C:\Windows\system32\net.exe
                  net config workstation
                  6⤵
                    PID:1784
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 config workstation
                      7⤵
                        PID:1660
                  • C:\Windows\system32\cmd.exe
                    /c net view /all
                    5⤵
                      PID:684
                      • C:\Windows\system32\net.exe
                        net view /all
                        6⤵
                        • Discovers systems in the same network
                        PID:1052
                    • C:\Windows\system32\cmd.exe
                      /c net view /all /domain
                      5⤵
                        PID:960
                        • C:\Windows\system32\net.exe
                          net view /all /domain
                          6⤵
                          • Discovers systems in the same network
                          PID:1012
                      • C:\Windows\system32\cmd.exe
                        /c nltest /domain_trusts
                        5⤵
                          PID:584
                          • C:\Windows\system32\nltest.exe
                            nltest /domain_trusts
                            6⤵
                              PID:1732
                          • C:\Windows\system32\cmd.exe
                            /c nltest /domain_trusts /all_trusts
                            5⤵
                              PID:1852
                              • C:\Windows\system32\nltest.exe
                                nltest /domain_trusts /all_trusts
                                6⤵
                                  PID:284
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe
                              4⤵
                                PID:1280
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe
                                4⤵
                                • Blocklisted process makes network request
                                PID:2024
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:932
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe
                                4⤵
                                • Blocklisted process makes network request
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:612
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1276
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2992
                        • C:\WINDOWS\nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe
                          C:\WINDOWS\nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe C:\WINDOWS\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe
                          1⤵
                          • Drops startup file
                          • Loads dropped DLL
                          • Adds Run key to start application
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          PID:2832
                          • C:\WINDOWS\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe
                            -start
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of SetWindowsHookEx
                            PID:2840
                            • C:\Windows\system32\wermgr.exe
                              C:\Windows\system32\wermgr.exe
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2908
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe
                              3⤵
                                PID:2928

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Execution

                          Command-Line Interface

                          1
                          T1059

                          Persistence

                          Registry Run Keys / Startup Folder

                          1
                          T1060

                          Defense Evasion

                          Modify Registry

                          1
                          T1112

                          Credential Access

                          Credentials in Files

                          1
                          T1081

                          Discovery

                          Remote System Discovery

                          1
                          T1018

                          System Information Discovery

                          1
                          T1082

                          Collection

                          Data from Local System

                          1
                          T1005

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe
                            MD5

                            3dc65cac02fbe7c410007782ea678a77

                            SHA1

                            180f195d6372535785df1208172ef2e2e19ce548

                            SHA256

                            6b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee

                            SHA512

                            c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a

                          • \Users\Admin\AppData\Roaming\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe
                            MD5

                            3dc65cac02fbe7c410007782ea678a77

                            SHA1

                            180f195d6372535785df1208172ef2e2e19ce548

                            SHA256

                            6b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee

                            SHA512

                            c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a

                          • \Users\Default\AppData\Roaming\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe
                            MD5

                            3dc65cac02fbe7c410007782ea678a77

                            SHA1

                            180f195d6372535785df1208172ef2e2e19ce548

                            SHA256

                            6b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee

                            SHA512

                            c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a

                          • \Windows\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe
                            MD5

                            3dc65cac02fbe7c410007782ea678a77

                            SHA1

                            180f195d6372535785df1208172ef2e2e19ce548

                            SHA256

                            6b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee

                            SHA512

                            c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a

                          • \Windows\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe
                            MD5

                            3dc65cac02fbe7c410007782ea678a77

                            SHA1

                            180f195d6372535785df1208172ef2e2e19ce548

                            SHA256

                            6b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee

                            SHA512

                            c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a

                          • memory/284-98-0x0000000000000000-mapping.dmp
                          • memory/544-87-0x0000000000000000-mapping.dmp
                          • memory/584-95-0x0000000000000000-mapping.dmp
                          • memory/612-107-0x0000000000000000-mapping.dmp
                          • memory/684-91-0x0000000000000000-mapping.dmp
                          • memory/932-103-0x0000000000000000-mapping.dmp
                          • memory/960-93-0x0000000000000000-mapping.dmp
                          • memory/1012-94-0x0000000000000000-mapping.dmp
                          • memory/1052-92-0x0000000000000000-mapping.dmp
                          • memory/1096-88-0x0000000000000000-mapping.dmp
                          • memory/1264-83-0x0000000180000000-0x0000000180009000-memory.dmp
                            Filesize

                            36KB

                          • memory/1264-82-0x0000000000000000-mapping.dmp
                          • memory/1276-115-0x0000000000000000-mapping.dmp
                          • memory/1280-99-0x0000000000000000-mapping.dmp
                          • memory/1372-86-0x0000000000000000-mapping.dmp
                          • memory/1500-72-0x0000000000290000-0x0000000000291000-memory.dmp
                            Filesize

                            4KB

                          • memory/1500-71-0x00000000000F0000-0x0000000000118000-memory.dmp
                            Filesize

                            160KB

                          • memory/1500-70-0x0000000000000000-mapping.dmp
                          • memory/1532-77-0x0000000000060000-0x0000000000061000-memory.dmp
                            Filesize

                            4KB

                          • memory/1532-73-0x0000000000000000-mapping.dmp
                          • memory/1640-60-0x000007FEFBAB1000-0x000007FEFBAB3000-memory.dmp
                            Filesize

                            8KB

                          • memory/1660-90-0x0000000000000000-mapping.dmp
                          • memory/1732-96-0x0000000000000000-mapping.dmp
                          • memory/1780-78-0x0000000000000000-mapping.dmp
                          • memory/1784-89-0x0000000000000000-mapping.dmp
                          • memory/1852-97-0x0000000000000000-mapping.dmp
                          • memory/2024-101-0x0000000000000000-mapping.dmp
                          • memory/2024-69-0x0000000000511000-0x0000000000513000-memory.dmp
                            Filesize

                            8KB

                          • memory/2024-68-0x0000000000A30000-0x0000000000A41000-memory.dmp
                            Filesize

                            68KB

                          • memory/2024-67-0x0000000001FB0000-0x0000000001FF3000-memory.dmp
                            Filesize

                            268KB

                          • memory/2024-66-0x0000000000250000-0x00000000002D0000-memory.dmp
                            Filesize

                            512KB

                          • memory/2024-62-0x0000000075411000-0x0000000075413000-memory.dmp
                            Filesize

                            8KB

                          • memory/2024-63-0x0000000001F70000-0x0000000001FA7000-memory.dmp
                            Filesize

                            220KB

                          • memory/2024-61-0x0000000000000000-mapping.dmp
                          • memory/2840-121-0x0000000000000000-mapping.dmp
                          • memory/2840-124-0x0000000000AE0000-0x0000000000B20000-memory.dmp
                            Filesize

                            256KB

                          • memory/2840-130-0x0000000000350000-0x000000000038D000-memory.dmp
                            Filesize

                            244KB

                          • memory/2840-131-0x0000000000B90000-0x0000000000BCB000-memory.dmp
                            Filesize

                            236KB

                          • memory/2840-132-0x00000000002D0000-0x00000000002D1000-memory.dmp
                            Filesize

                            4KB

                          • memory/2840-133-0x0000000010001000-0x0000000010003000-memory.dmp
                            Filesize

                            8KB

                          • memory/2908-138-0x0000000000000000-mapping.dmp
                          • memory/2908-139-0x0000000000060000-0x0000000000089000-memory.dmp
                            Filesize

                            164KB

                          • memory/2908-140-0x0000000000360000-0x0000000000361000-memory.dmp
                            Filesize

                            4KB

                          • memory/2992-134-0x0000000000000000-mapping.dmp