Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 15:33
Static task
static1
Behavioral task
behavioral1
Sample
2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe
Resource
win10-en-20211208
General
-
Target
2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe
-
Size
17KB
-
MD5
567a432113ebf6eca6942685a0ce312e
-
SHA1
9fcca30ee68b33d36a6da325f1fd460483b686ee
-
SHA256
2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d
-
SHA512
c91076b0ff21cd40b5ae3c498d37a8a8554a9ac0dfa8a28ae350487dc99994d4c02fcfcec932640d481ce8ada49ed5b14ec5b601a0ee1f390abcfaed63cb3512
Malware Config
Extracted
nworm
v0.3.8
141.255.151.126:54984
87ca7a0e
Signatures
-
NWorm
A TrickBot module used to propagate to vulnerable domain controllers.
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exepid process 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exedescription pid process Token: SeDebugPrivilege 64 2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe"C:\Users\Admin\AppData\Local\Temp\2633abb800c264c6193fc4afecbb44df272f1db8d332eec1bb9adcd993c97e3d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken