Overview
overview
10Static
static
0d2cda8805...68.dll
windows7_x64
100d2cda8805...68.dll
windows10-2004_x64
100ee7590362...44.exe
windows7_x64
100ee7590362...44.exe
windows10-2004_x64
101ddb782ee3...18.exe
windows7_x64
101ddb782ee3...18.exe
windows10-2004_x64
1041b4e93a1d...11.dll
windows7_x64
1041b4e93a1d...11.dll
windows10-2004_x64
10606c060979...b5.dll
windows7_x64
10606c060979...b5.dll
windows10-2004_x64
1072534ec2c4...77.dll
windows7_x64
1072534ec2c4...77.dll
windows10-2004_x64
109da8a5a0b5...e1.dll
windows7_x64
109da8a5a0b5...e1.dll
windows10-2004_x64
10b99e41eff1...70.dll
windows7_x64
1b99e41eff1...70.dll
windows10-2004_x64
1b9e0e806c7...5b.exe
windows7_x64
10b9e0e806c7...5b.exe
windows10-2004_x64
10d215aa40c0...59.dll
windows7_x64
10d215aa40c0...59.dll
windows10-2004_x64
10e2f6ac2c14...dc.dll
windows7_x64
10e2f6ac2c14...dc.dll
windows10-2004_x64
10e45cc54b2d...9d.dll
windows7_x64
1e45cc54b2d...9d.dll
windows10-2004_x64
1f1b9d5520b...73.dll
windows7_x64
10f1b9d5520b...73.dll
windows10-2004_x64
10Analysis
-
max time kernel
284s -
max time network
303s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-06-2022 06:12
Static task
static1
Behavioral task
behavioral1
Sample
0d2cda88052d6a9feb73fd7383fb412f15a854f2af1d997dc1048a48edeeca68.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0d2cda88052d6a9feb73fd7383fb412f15a854f2af1d997dc1048a48edeeca68.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
1ddb782ee3b9f61cbdb87a1eb04f020de9e8febcea4d823b105c38d072f58818.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
1ddb782ee3b9f61cbdb87a1eb04f020de9e8febcea4d823b105c38d072f58818.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
41b4e93a1dd1b49e123b1c4a81dc6be266c5fee5f33263bdb7e3ca9e1a7c4011.dll
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
41b4e93a1dd1b49e123b1c4a81dc6be266c5fee5f33263bdb7e3ca9e1a7c4011.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
606c0609795d39cb100592a57b8f0ccbb23809f6f77c5abc0baeb43cf177adb5.dll
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
606c0609795d39cb100592a57b8f0ccbb23809f6f77c5abc0baeb43cf177adb5.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
72534ec2c4fc2499e1f85e9149598d240177afc8b9e7b04e1df2abcf92a7b677.dll
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
72534ec2c4fc2499e1f85e9149598d240177afc8b9e7b04e1df2abcf92a7b677.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
9da8a5a0b5957db6112e927b607a8fd062b870f2132c4ae3442eb63235f789e1.dll
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
9da8a5a0b5957db6112e927b607a8fd062b870f2132c4ae3442eb63235f789e1.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
b99e41eff12466eec7d69ed94156b9a29fdfadb108ee01019c258a631fadac70.dll
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
b99e41eff12466eec7d69ed94156b9a29fdfadb108ee01019c258a631fadac70.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
b9e0e806c71d915e3cc2401d4a0d0d1f5d4cf1f3eb15c93f862b07c416b1195b.exe
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
b9e0e806c71d915e3cc2401d4a0d0d1f5d4cf1f3eb15c93f862b07c416b1195b.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
d215aa40c0e512b7562cad4de5b0790d88facafcdef3f80484b08a50d0c47859.dll
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
d215aa40c0e512b7562cad4de5b0790d88facafcdef3f80484b08a50d0c47859.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
e2f6ac2c144bf28ac853c5dc3f3c4ce5ff08f42076c1d996c1ebb6362f9e66dc.dll
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
e2f6ac2c144bf28ac853c5dc3f3c4ce5ff08f42076c1d996c1ebb6362f9e66dc.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
e45cc54b2d0faaf9870ed2d7b4f7febd2cb4bc119e6989c23f29411085bd889d.dll
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
e45cc54b2d0faaf9870ed2d7b4f7febd2cb4bc119e6989c23f29411085bd889d.dll
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
f1b9d5520ba13179e19b336e542d18b0bd9f39a2b41d88a739625c8480422b73.dll
Resource
win7-20220414-en
General
-
Target
0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe
-
Size
1.3MB
-
MD5
ad2d8367ebad467d07fc7ac3834db801
-
SHA1
16f9f4831eee1faa40ab4bd027f3303c606c4de4
-
SHA256
0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344
-
SHA512
86de35b8f5016f377b9bd641586970f9257b541f41e346a066f31fbe392c20322ffe5a80e9d996dc4fcfac2ce50be434620e8ad1ab4f24d4b8ce273b2ea2b06b
Malware Config
Extracted
trickbot
2000030
lib108
196.43.106.38:443
186.97.172.178:443
37.228.70.134:443
144.48.139.206:443
190.110.179.139:443
172.105.15.152:443
177.67.137.111:443
27.72.107.215:443
186.66.15.10:443
189.206.78.155:443
202.131.227.229:443
185.9.187.10:443
196.41.57.46:443
212.200.25.118:443
197.254.14.238:443
45.229.71.211:443
181.167.217.53:443
181.129.116.58:443
185.189.55.207:443
172.104.241.29:443
14.241.244.60:443
144.48.138.213:443
202.138.242.7:443
202.166.196.111:443
36.94.100.202:443
187.19.167.233:443
181.129.242.202:443
36.94.27.124:443
43.245.216.116:443
186.225.63.18:443
41.77.134.250:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 4252 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exepid process 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exedescription pid process target process PID 1456 wrote to memory of 2224 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe cmd.exe PID 1456 wrote to memory of 2224 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe cmd.exe PID 1456 wrote to memory of 1080 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe cmd.exe PID 1456 wrote to memory of 1080 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe cmd.exe PID 1456 wrote to memory of 4252 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe wermgr.exe PID 1456 wrote to memory of 4252 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe wermgr.exe PID 1456 wrote to memory of 4252 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe wermgr.exe PID 1456 wrote to memory of 4252 1456 0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe"C:\Users\Admin\AppData\Local\Temp\0ee7590362df39d54f390e2f5ae309d36f75961c992667ec34b1113fe405f344.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1456-130-0x00000000024D0000-0x000000000250F000-memory.dmpFilesize
252KB
-
memory/1456-134-0x0000000002610000-0x000000000264B000-memory.dmpFilesize
236KB
-
memory/1456-135-0x0000000002490000-0x00000000024CD000-memory.dmpFilesize
244KB
-
memory/1456-136-0x0000000002610000-0x000000000264B000-memory.dmpFilesize
236KB
-
memory/1456-139-0x0000000002610000-0x000000000264B000-memory.dmpFilesize
236KB
-
memory/4252-137-0x0000000000000000-mapping.dmp
-
memory/4252-138-0x0000020A998E0000-0x0000020A99909000-memory.dmpFilesize
164KB