Analysis Overview
SHA256
963e98f830e6673d9046866f839ee02c99acbdd3aa64d708d5745971bda24bab
Threat Level: Known bad
The file 963e98f830e6673d9046866f839ee02c99acbdd3aa64d708d5745971bda24bab was found to be: Known bad.
Malicious Activity Summary
Trickbot
Dave packer
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-02-05 12:36
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-02-05 12:36
Reported
2022-02-05 12:39
Platform
win7-en-20211208
Max time kernel
147s
Max time network
130s
Command Line
Signatures
Trickbot
Dave packer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\963e98f830e6673d9046866f839ee02c99acbdd3aa64d708d5745971bda24bab.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\wermgr.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\wermgr.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\963e98f830e6673d9046866f839ee02c99acbdd3aa64d708d5745971bda24bab.exe
"C:\Users\Admin\AppData\Local\Temp\963e98f830e6673d9046866f839ee02c99acbdd3aa64d708d5745971bda24bab.exe"
C:\Windows\system32\wermgr.exe
C:\Windows\system32\wermgr.exe
Network
Files
memory/1160-54-0x0000000076C61000-0x0000000076C63000-memory.dmp
memory/1160-55-0x0000000000450000-0x000000000047E000-memory.dmp
memory/1160-58-0x0000000001BE0000-0x0000000001C0B000-memory.dmp
memory/1160-59-0x00000000003C0000-0x00000000003EC000-memory.dmp
memory/1160-60-0x0000000000480000-0x00000000004AA000-memory.dmp
memory/1160-62-0x0000000010000000-0x0000000010003000-memory.dmp
memory/1160-61-0x00000000003F0000-0x00000000003F1000-memory.dmp
memory/756-63-0x0000000000060000-0x0000000000080000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2022-02-05 12:36
Reported
2022-02-05 12:39
Platform
win10v2004-en-20220113
Max time kernel
3s
Max time network
11s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\963e98f830e6673d9046866f839ee02c99acbdd3aa64d708d5745971bda24bab.exe
"C:\Users\Admin\AppData\Local\Temp\963e98f830e6673d9046866f839ee02c99acbdd3aa64d708d5745971bda24bab.exe"