Analysis

  • max time kernel
    159s
  • max time network
    158s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    26-01-2022 14:54

General

  • Target

    969bf85fa53fdd3a9ff05742f1c4bc07a47548df1919b9eea97e497bd93fa3fe.exe

  • Size

    16KB

  • MD5

    be406519fff73c410739350f866dc170

  • SHA1

    be287ac93ec8fb38027bbfc012d16cd0bdf2e202

  • SHA256

    969bf85fa53fdd3a9ff05742f1c4bc07a47548df1919b9eea97e497bd93fa3fe

  • SHA512

    c922f45bfa948091c840bd3d4f4a9412487dbfda938be56563c91e0cf144d941e89038637d28bc95f865606bd593b870faa388db1797491e6504160c4f96465b

Score
10/10

Malware Config

Extracted

Family

nworm

Version

v0.3.8

C2

193.161.193.99:8068

Mutex

20a611a2

Signatures

  • NWorm

    A TrickBot module used to propagate to vulnerable domain controllers.

Processes

  • C:\Users\Admin\AppData\Local\Temp\969bf85fa53fdd3a9ff05742f1c4bc07a47548df1919b9eea97e497bd93fa3fe.exe
    "C:\Users\Admin\AppData\Local\Temp\969bf85fa53fdd3a9ff05742f1c4bc07a47548df1919b9eea97e497bd93fa3fe.exe"
    1⤵
      PID:2828

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2828-118-0x00000000001B0000-0x00000000001BA000-memory.dmp
      Filesize

      40KB

    • memory/2828-119-0x0000000000A30000-0x0000000000A32000-memory.dmp
      Filesize

      8KB