Analysis
-
max time kernel
154s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 14:53
Static task
static1
Behavioral task
behavioral1
Sample
162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe
Resource
win10-en-20211208
General
-
Target
162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe
-
Size
17KB
-
MD5
387d598af1ab8e2f3c611d5df5e4c441
-
SHA1
9bdee4fe605b4a35c923c53530ccb2eda98f3e09
-
SHA256
162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d
-
SHA512
c32298a93be95e8c112d8bd49222df8b79530e25e198f8df8c2f8834b2d9a745cab9c982c8f239293ea373c71fbe22e179c5ab9091ba9a66917a28dd1c6dd7a6
Malware Config
Extracted
nworm
v0.3.8
127.0.0.1:1133
d6918d59
Signatures
-
NWorm
A TrickBot module used to propagate to vulnerable domain controllers.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exepid process 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exedescription pid process Token: SeDebugPrivilege 3508 162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe"C:\Users\Admin\AppData\Local\Temp\162be825adc37d92d3d43d15b6bf960f67d0aab3fa6e854034f396074582ff1d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken