Analysis
-
max time kernel
135s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 07:54
Behavioral task
behavioral1
Sample
ba87c3d8adc50c452e7766405298ef08d0919bed8f41abd8c10a10289a348cb4.exe
Resource
win7-20220414-en
General
-
Target
ba87c3d8adc50c452e7766405298ef08d0919bed8f41abd8c10a10289a348cb4.exe
-
Size
196KB
-
MD5
685f692b3ba186d3470fe70ad6d3f007
-
SHA1
53d350351cdc3add444e4ef6d31381066b9f6ad0
-
SHA256
ba87c3d8adc50c452e7766405298ef08d0919bed8f41abd8c10a10289a348cb4
-
SHA512
d4f4bcc293ec05a71e829df257d1a5c74f1e6498a6188d479c0d0d983949f2b089de9efee3be877e5789d4bde804c57887b3f09b571f9c1f43f4a7c8486d21d4
Malware Config
Extracted
trickbot
1000499
tot677
5.182.210.226:443
82.146.62.52:443
193.26.217.243:443
5.2.78.77:443
107.172.165.149:443
185.14.29.84:443
178.156.202.130:443
185.62.188.10:443
5.255.96.115:443
212.80.216.209:443
195.133.145.31:443
5.34.177.97:443
85.143.216.206:443
185.99.2.193:443
5.182.210.4:443
178.156.202.120:443
146.185.253.197:443
194.99.21.139:443
185.200.241.248:443
185.183.96.43:443
190.214.13.2:449
181.140.173.186:449
181.129.104.139:449
181.113.28.146:449
181.112.157.42:449
170.84.78.224:449
200.21.51.38:449
46.174.235.36:449
36.89.85.103:449
181.129.134.18:449
186.71.150.23:449
131.161.253.190:449
200.127.121.99:449
114.8.133.71:449
119.252.165.75:449
121.100.19.18:449
202.29.215.114:449
180.180.216.177:449
171.100.142.238:449
186.232.91.240:449
181.196.207.202:449
-
autorunName:pwgrab
Signatures
-
Trickbot x86 loader 1 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/3256-130-0x0000000000400000-0x0000000000431000-memory.dmp trickbot_loader32 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2692 3256 WerFault.exe ba87c3d8adc50c452e7766405298ef08d0919bed8f41abd8c10a10289a348cb4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba87c3d8adc50c452e7766405298ef08d0919bed8f41abd8c10a10289a348cb4.exe"C:\Users\Admin\AppData\Local\Temp\ba87c3d8adc50c452e7766405298ef08d0919bed8f41abd8c10a10289a348cb4.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3256 -s 2242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3256 -ip 32561⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3256-130-0x0000000000400000-0x0000000000431000-memory.dmpFilesize
196KB