Analysis
-
max time kernel
1724s -
max time network
1756s -
platform
windows7_x64 -
resource
win7-en -
submitted
13-09-2021 16:54
Static task
static1
Behavioral task
behavioral1
Sample
triage_dropped_file.dll
Resource
win7-en
Behavioral task
behavioral2
Sample
triage_dropped_file.dll
Resource
win10v20210408
General
-
Target
triage_dropped_file.dll
-
Size
542KB
-
MD5
a72b41be79e3fba13890f3487e6e794b
-
SHA1
180ec439b27f512428550d3a199edcd013754602
-
SHA256
b4095d1c356a145cca001102abd0ad719a1798594756d20e198f92a39ba21af7
-
SHA512
4c21d93e14aea94afca3378b6adbddad2c0ddc579d1bf81e437da2b42d1228992ffe61532a3055af9e794144c3ff0f8f31aff9c9e297a0dba41d649af614a3d6
Malware Config
Extracted
trickbot
2000033
zem1
179.42.137.102:443
191.36.152.198:443
179.42.137.104:443
179.42.137.106:443
179.42.137.108:443
202.183.12.124:443
194.190.18.122:443
103.56.207.230:443
171.103.187.218:449
171.103.189.118:449
18.139.111.104:443
179.42.137.105:443
186.4.193.75:443
171.101.229.2:449
179.42.137.107:443
103.56.43.209:449
179.42.137.110:443
45.181.207.156:443
197.44.54.162:449
179.42.137.109:443
103.59.105.226:449
45.181.207.101:443
117.196.236.205:443
72.224.45.102:449
179.42.137.111:443
96.47.239.181:443
171.100.112.190:449
117.196.239.6:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
wermgr.exedescription ioc process File created C:\Windows\system32\cn\rxvoxmz.txt wermgr.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1220 ipconfig.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
svchost.exesvchost.exesvchost.exepid process 1976 svchost.exe 1620 svchost.exe 1620 svchost.exe 588 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
wermgr.exesvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 2016 wermgr.exe Token: SeDebugPrivilege 1976 svchost.exe Token: SeDebugPrivilege 1620 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeregsvr32.exewermgr.exedescription pid process target process PID 1032 wrote to memory of 1568 1032 regsvr32.exe regsvr32.exe PID 1032 wrote to memory of 1568 1032 regsvr32.exe regsvr32.exe PID 1032 wrote to memory of 1568 1032 regsvr32.exe regsvr32.exe PID 1032 wrote to memory of 1568 1032 regsvr32.exe regsvr32.exe PID 1032 wrote to memory of 1568 1032 regsvr32.exe regsvr32.exe PID 1032 wrote to memory of 1568 1032 regsvr32.exe regsvr32.exe PID 1032 wrote to memory of 1568 1032 regsvr32.exe regsvr32.exe PID 1568 wrote to memory of 2016 1568 regsvr32.exe wermgr.exe PID 1568 wrote to memory of 2016 1568 regsvr32.exe wermgr.exe PID 1568 wrote to memory of 2016 1568 regsvr32.exe wermgr.exe PID 1568 wrote to memory of 2016 1568 regsvr32.exe wermgr.exe PID 1568 wrote to memory of 2016 1568 regsvr32.exe wermgr.exe PID 1568 wrote to memory of 2016 1568 regsvr32.exe wermgr.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe PID 2016 wrote to memory of 1976 2016 wermgr.exe svchost.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exe/c ipconfig /all5⤵
-
C:\Windows\system32\ipconfig.exeipconfig /all6⤵
- Gathers network information
-
C:\Windows\system32\cmd.exe/c net config workstation5⤵
-
C:\Windows\system32\net.exenet config workstation6⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 config workstation7⤵
-
C:\Windows\system32\cmd.exe/c net view /all5⤵
-
C:\Windows\system32\net.exenet view /all6⤵
- Discovers systems in the same network
-
C:\Windows\system32\cmd.exe/c net view /all /domain5⤵
-
C:\Windows\system32\net.exenet view /all /domain6⤵
- Discovers systems in the same network
-
C:\Windows\system32\cmd.exe/c nltest /domain_trusts5⤵
-
C:\Windows\system32\nltest.exenltest /domain_trusts6⤵
-
C:\Windows\system32\cmd.exe/c nltest /domain_trusts /all_trusts5⤵
-
C:\Windows\system32\nltest.exenltest /domain_trusts /all_trusts6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/432-82-0x0000000000000000-mapping.dmp
-
memory/432-94-0x0000000000000000-mapping.dmp
-
memory/588-79-0x0000000180000000-0x000000018000A000-memory.dmpFilesize
40KB
-
memory/588-78-0x0000000000000000-mapping.dmp
-
memory/792-87-0x0000000000000000-mapping.dmp
-
memory/892-90-0x0000000000000000-mapping.dmp
-
memory/1032-53-0x000007FEFB651000-0x000007FEFB653000-memory.dmpFilesize
8KB
-
memory/1188-85-0x0000000000000000-mapping.dmp
-
memory/1220-83-0x0000000000000000-mapping.dmp
-
memory/1368-89-0x0000000000000000-mapping.dmp
-
memory/1568-62-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/1568-63-0x0000000000161000-0x0000000000163000-memory.dmpFilesize
8KB
-
memory/1568-61-0x0000000000240000-0x0000000000285000-memory.dmpFilesize
276KB
-
memory/1568-59-0x0000000000200000-0x0000000000238000-memory.dmpFilesize
224KB
-
memory/1568-56-0x0000000010000000-0x0000000010004000-memory.dmpFilesize
16KB
-
memory/1568-55-0x0000000075B51000-0x0000000075B53000-memory.dmpFilesize
8KB
-
memory/1568-54-0x0000000000000000-mapping.dmp
-
memory/1620-72-0x0000000000000000-mapping.dmp
-
memory/1640-93-0x0000000000000000-mapping.dmp
-
memory/1660-91-0x0000000000000000-mapping.dmp
-
memory/1700-86-0x0000000000000000-mapping.dmp
-
memory/1768-76-0x0000000000000000-mapping.dmp
-
memory/1788-88-0x0000000000000000-mapping.dmp
-
memory/1976-71-0x00000000000E0000-0x00000000000E1000-memory.dmpFilesize
4KB
-
memory/1976-67-0x0000000000000000-mapping.dmp
-
memory/1980-92-0x0000000000000000-mapping.dmp
-
memory/2012-84-0x0000000000000000-mapping.dmp
-
memory/2016-65-0x0000000000060000-0x0000000000089000-memory.dmpFilesize
164KB
-
memory/2016-66-0x0000000000190000-0x0000000000191000-memory.dmpFilesize
4KB
-
memory/2016-64-0x0000000000000000-mapping.dmp