Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en -
submitted
13-09-2021 16:26
Static task
static1
Behavioral task
behavioral1
Sample
triage_dropped_file.dll
Resource
win7-en
Behavioral task
behavioral2
Sample
triage_dropped_file.dll
Resource
win10v20210408
General
-
Target
triage_dropped_file.dll
-
Size
542KB
-
MD5
a72b41be79e3fba13890f3487e6e794b
-
SHA1
180ec439b27f512428550d3a199edcd013754602
-
SHA256
b4095d1c356a145cca001102abd0ad719a1798594756d20e198f92a39ba21af7
-
SHA512
4c21d93e14aea94afca3378b6adbddad2c0ddc579d1bf81e437da2b42d1228992ffe61532a3055af9e794144c3ff0f8f31aff9c9e297a0dba41d649af614a3d6
Malware Config
Extracted
trickbot
2000033
zem1
179.42.137.102:443
191.36.152.198:443
179.42.137.104:443
179.42.137.106:443
179.42.137.108:443
202.183.12.124:443
194.190.18.122:443
103.56.207.230:443
171.103.187.218:449
171.103.189.118:449
18.139.111.104:443
179.42.137.105:443
186.4.193.75:443
171.101.229.2:449
179.42.137.107:443
103.56.43.209:449
179.42.137.110:443
45.181.207.156:443
197.44.54.162:449
179.42.137.109:443
103.59.105.226:449
45.181.207.101:443
117.196.236.205:443
72.224.45.102:449
179.42.137.111:443
96.47.239.181:443
171.100.112.190:449
117.196.239.6:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip.anysrc.net -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 400 wermgr.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 1960 wrote to memory of 1732 1960 regsvr32.exe regsvr32.exe PID 1960 wrote to memory of 1732 1960 regsvr32.exe regsvr32.exe PID 1960 wrote to memory of 1732 1960 regsvr32.exe regsvr32.exe PID 1960 wrote to memory of 1732 1960 regsvr32.exe regsvr32.exe PID 1960 wrote to memory of 1732 1960 regsvr32.exe regsvr32.exe PID 1960 wrote to memory of 1732 1960 regsvr32.exe regsvr32.exe PID 1960 wrote to memory of 1732 1960 regsvr32.exe regsvr32.exe PID 1732 wrote to memory of 400 1732 regsvr32.exe wermgr.exe PID 1732 wrote to memory of 400 1732 regsvr32.exe wermgr.exe PID 1732 wrote to memory of 400 1732 regsvr32.exe wermgr.exe PID 1732 wrote to memory of 400 1732 regsvr32.exe wermgr.exe PID 1732 wrote to memory of 400 1732 regsvr32.exe wermgr.exe PID 1732 wrote to memory of 400 1732 regsvr32.exe wermgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/400-63-0x0000000000000000-mapping.dmp
-
memory/400-64-0x0000000000060000-0x0000000000089000-memory.dmpFilesize
164KB
-
memory/400-65-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/1732-54-0x0000000000000000-mapping.dmp
-
memory/1732-55-0x0000000075C11000-0x0000000075C13000-memory.dmpFilesize
8KB
-
memory/1732-58-0x0000000000190000-0x00000000001C8000-memory.dmpFilesize
224KB
-
memory/1732-56-0x0000000010000000-0x0000000010004000-memory.dmpFilesize
16KB
-
memory/1732-61-0x0000000000220000-0x00000000002A0000-memory.dmpFilesize
512KB
-
memory/1732-62-0x0000000000220000-0x00000000002A0000-memory.dmpFilesize
512KB
-
memory/1960-53-0x000007FEFC161000-0x000007FEFC163000-memory.dmpFilesize
8KB