Analysis
-
max time kernel
1786s -
max time network
1703s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
19-08-2021 14:54
Static task
static1
Behavioral task
behavioral1
Sample
referenceSet.jpg.dll
Resource
win7v20210410
General
-
Target
referenceSet.jpg.dll
-
Size
594KB
-
MD5
fbbc24f5345b11b35b8f0b68c9d30caa
-
SHA1
13a5fd90f3dbc9797a59cf924aa7c6bdc35cacdf
-
SHA256
bcdac7b40846874f002e6f59413a381e4ae13bf7181eae60203c0ae69f799a57
-
SHA512
6f05c0d78a7e01e8659410c513a7852709d53db36d885c3a4a32bf8e089cc7cbeab0d129cf669991c779a488ffa515ea2d0ebe49ca03e7881d36ebbc09b13faa
Malware Config
Extracted
trickbot
2000031
zev1
14.232.161.45:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2608 created 1000 2608 WerFault.exe cmd.exe -
suricata: ET MALWARE Trickbot Checkin Response
suricata: ET MALWARE Trickbot Checkin Response
-
suricata: ET MALWARE Win32/Trickbot Data Exfiltration
suricata: ET MALWARE Win32/Trickbot Data Exfiltration
-
Blocklisted process makes network request 2 IoCs
Processes:
cmd.execmd.exeflow pid process 78 740 cmd.exe 81 2524 cmd.exe -
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2608 1000 WerFault.exe cmd.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 3192 ipconfig.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
cmd.execmd.execmd.exeWerFault.execmd.exepid process 3888 cmd.exe 3888 cmd.exe 3748 cmd.exe 3748 cmd.exe 740 cmd.exe 740 cmd.exe 3748 cmd.exe 3748 cmd.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 3244 cmd.exe 3244 cmd.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
wermgr.execmd.execmd.exeWerFault.execmd.exeLogonUI.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2772 wermgr.exe Token: SeDebugPrivilege 3888 cmd.exe Token: SeDebugPrivilege 3748 cmd.exe Token: SeDebugPrivilege 2608 WerFault.exe Token: SeDebugPrivilege 3244 cmd.exe Token: SeShutdownPrivilege 3676 LogonUI.exe Token: SeCreatePagefilePrivilege 3676 LogonUI.exe Token: SeShutdownPrivilege 2764 Explorer.EXE Token: SeCreatePagefilePrivilege 2764 Explorer.EXE Token: SeShutdownPrivilege 2764 Explorer.EXE Token: SeCreatePagefilePrivilege 2764 Explorer.EXE Token: SeShutdownPrivilege 2764 Explorer.EXE Token: SeCreatePagefilePrivilege 2764 Explorer.EXE Token: SeShutdownPrivilege 2764 Explorer.EXE Token: SeCreatePagefilePrivilege 2764 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 3676 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeregsvr32.exewermgr.exedescription pid process target process PID 3156 wrote to memory of 592 3156 regsvr32.exe regsvr32.exe PID 3156 wrote to memory of 592 3156 regsvr32.exe regsvr32.exe PID 3156 wrote to memory of 592 3156 regsvr32.exe regsvr32.exe PID 592 wrote to memory of 2772 592 regsvr32.exe wermgr.exe PID 592 wrote to memory of 2772 592 regsvr32.exe wermgr.exe PID 592 wrote to memory of 2772 592 regsvr32.exe wermgr.exe PID 592 wrote to memory of 2772 592 regsvr32.exe wermgr.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe PID 2772 wrote to memory of 3888 2772 wermgr.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\referenceSet.jpg.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\referenceSet.jpg.dll3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exe/c ipconfig /all6⤵
-
C:\Windows\system32\ipconfig.exeipconfig /all7⤵
- Gathers network information
-
C:\Windows\system32\cmd.exe/c net config workstation6⤵
-
C:\Windows\system32\net.exenet config workstation7⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 config workstation8⤵
-
C:\Windows\system32\cmd.exe/c net view /all6⤵
-
C:\Windows\system32\net.exenet view /all7⤵
- Discovers systems in the same network
-
C:\Windows\system32\cmd.exe/c net view /all /domain6⤵
-
C:\Windows\system32\net.exenet view /all /domain7⤵
- Discovers systems in the same network
-
C:\Windows\system32\cmd.exe/c nltest /domain_trusts6⤵
-
C:\Windows\system32\nltest.exenltest /domain_trusts7⤵
-
C:\Windows\system32\cmd.exe/c nltest /domain_trusts /all_trusts6⤵
-
C:\Windows\system32\nltest.exenltest /domain_trusts /all_trusts7⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe5⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1000 -s 3286⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Blocklisted process makes network request
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ace855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\LockAppHost.exeC:\Windows\System32\LockAppHost.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/520-153-0x0000000000000000-mapping.dmp
-
memory/588-146-0x0000000000000000-mapping.dmp
-
memory/592-116-0x0000000004860000-0x0000000004897000-memory.dmpFilesize
220KB
-
memory/592-118-0x0000000004680000-0x000000000488E000-memory.dmpFilesize
2.1MB
-
memory/592-120-0x0000000004910000-0x0000000004911000-memory.dmpFilesize
4KB
-
memory/592-119-0x00000000048A0000-0x00000000048E3000-memory.dmpFilesize
268KB
-
memory/592-121-0x00000000048F1000-0x00000000048F3000-memory.dmpFilesize
8KB
-
memory/592-114-0x0000000000000000-mapping.dmp
-
memory/740-140-0x0000000000000000-mapping.dmp
-
memory/740-141-0x0000000180000000-0x0000000180009000-memory.dmpFilesize
36KB
-
memory/1000-157-0x0000000000000000-mapping.dmp
-
memory/1216-148-0x0000000000000000-mapping.dmp
-
memory/1268-154-0x0000000000000000-mapping.dmp
-
memory/2196-149-0x0000000000000000-mapping.dmp
-
memory/2256-144-0x0000000000000000-mapping.dmp
-
memory/2524-163-0x0000000000000000-mapping.dmp
-
memory/2688-151-0x0000000000000000-mapping.dmp
-
memory/2764-173-0x0000000000170000-0x0000000000186000-memory.dmpFilesize
88KB
-
memory/2764-174-0x0000000000190000-0x00000000001AB000-memory.dmpFilesize
108KB
-
memory/2772-123-0x00000285BA310000-0x00000285BA338000-memory.dmpFilesize
160KB
-
memory/2772-122-0x0000000000000000-mapping.dmp
-
memory/2772-124-0x00000285BA420000-0x00000285BA421000-memory.dmpFilesize
4KB
-
memory/3088-155-0x0000000000000000-mapping.dmp
-
memory/3192-145-0x0000000000000000-mapping.dmp
-
memory/3236-152-0x0000000000000000-mapping.dmp
-
memory/3244-165-0x0000000000000000-mapping.dmp
-
memory/3740-147-0x0000000000000000-mapping.dmp
-
memory/3748-134-0x0000000000000000-mapping.dmp
-
memory/3768-156-0x0000000000000000-mapping.dmp
-
memory/3888-127-0x0000000000000000-mapping.dmp
-
memory/3888-133-0x0000023E9B180000-0x0000023E9B181000-memory.dmpFilesize
4KB
-
memory/3920-150-0x0000000000000000-mapping.dmp