Analysis
-
max time kernel
75s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-06-2022 23:28
Static task
static1
Behavioral task
behavioral1
Sample
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe
Resource
win7-20220414-en
General
-
Target
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe
-
Size
556KB
-
MD5
865369af4fc338efdc45d8aa59b90132
-
SHA1
d077fbcf5de5b452ce62c1bdc6d0b81c2d4b28f5
-
SHA256
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08
-
SHA512
5e0c0d37889b5633de7deb01aea023c7431b3a116d1da3950e8c75a436633f3d22cbd10a642a813d4d4be5b410e5c1c9b567452f61745afb6513223bad84c9d5
Malware Config
Extracted
trickbot
1000503
qw6
5.182.210.226:443
192.210.226.106:443
51.254.164.244:443
45.148.120.153:443
195.123.239.67:443
194.5.250.150:443
217.12.209.200:443
185.99.2.221:443
51.254.164.245:443
185.62.188.159:443
46.17.107.65:443
185.20.185.76:443
185.203.118.37:443
146.185.253.178:443
185.14.31.252:443
185.99.2.115:443
172.245.156.138:443
51.89.73.158:443
190.214.13.2:449
181.140.173.186:449
181.129.104.139:449
181.113.28.146:449
181.112.157.42:449
170.84.78.224:449
200.21.51.38:449
46.174.235.36:449
36.89.85.103:449
181.129.134.18:449
186.71.150.23:449
131.161.253.190:449
200.127.121.99:449
114.8.133.71:449
119.252.165.75:449
121.100.19.18:449
202.29.215.114:449
180.180.216.177:449
171.100.142.238:449
186.232.91.240:449
181.196.207.202:449
-
autorunName:pwgrab
Signatures
-
Dave packer 3 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral1/memory/1048-55-0x00000000003B0000-0x00000000003E6000-memory.dmp dave behavioral1/memory/1048-59-0x00000000002A0000-0x00000000002E3000-memory.dmp dave behavioral1/memory/1260-65-0x00000000003C0000-0x00000000003F6000-memory.dmp dave -
Executes dropped EXE 1 IoCs
Processes:
ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exepid process 1260 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe -
Loads dropped DLL 2 IoCs
Processes:
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exepid process 1048 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe 1048 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exeↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exepid process 1048 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe 1048 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe 1260 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe 1260 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exedescription pid process target process PID 1048 wrote to memory of 1260 1048 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe PID 1048 wrote to memory of 1260 1048 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe PID 1048 wrote to memory of 1260 1048 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe PID 1048 wrote to memory of 1260 1048 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe"C:\Users\Admin\AppData\Local\Temp\0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe"C:\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exeFilesize
556KB
MD5865369af4fc338efdc45d8aa59b90132
SHA1d077fbcf5de5b452ce62c1bdc6d0b81c2d4b28f5
SHA2560cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08
SHA5125e0c0d37889b5633de7deb01aea023c7431b3a116d1da3950e8c75a436633f3d22cbd10a642a813d4d4be5b410e5c1c9b567452f61745afb6513223bad84c9d5
-
C:\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exeFilesize
556KB
MD5865369af4fc338efdc45d8aa59b90132
SHA1d077fbcf5de5b452ce62c1bdc6d0b81c2d4b28f5
SHA2560cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08
SHA5125e0c0d37889b5633de7deb01aea023c7431b3a116d1da3950e8c75a436633f3d22cbd10a642a813d4d4be5b410e5c1c9b567452f61745afb6513223bad84c9d5
-
\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exeFilesize
556KB
MD5865369af4fc338efdc45d8aa59b90132
SHA1d077fbcf5de5b452ce62c1bdc6d0b81c2d4b28f5
SHA2560cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08
SHA5125e0c0d37889b5633de7deb01aea023c7431b3a116d1da3950e8c75a436633f3d22cbd10a642a813d4d4be5b410e5c1c9b567452f61745afb6513223bad84c9d5
-
\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exeFilesize
556KB
MD5865369af4fc338efdc45d8aa59b90132
SHA1d077fbcf5de5b452ce62c1bdc6d0b81c2d4b28f5
SHA2560cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08
SHA5125e0c0d37889b5633de7deb01aea023c7431b3a116d1da3950e8c75a436633f3d22cbd10a642a813d4d4be5b410e5c1c9b567452f61745afb6513223bad84c9d5
-
memory/1048-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmpFilesize
8KB
-
memory/1048-55-0x00000000003B0000-0x00000000003E6000-memory.dmpFilesize
216KB
-
memory/1048-59-0x00000000002A0000-0x00000000002E3000-memory.dmpFilesize
268KB
-
memory/1260-62-0x0000000000000000-mapping.dmp
-
memory/1260-65-0x00000000003C0000-0x00000000003F6000-memory.dmpFilesize
216KB
-
memory/1260-70-0x0000000000540000-0x0000000000572000-memory.dmpFilesize
200KB
-
memory/1260-71-0x0000000000490000-0x00000000004C2000-memory.dmpFilesize
200KB
-
memory/1260-72-0x0000000000541000-0x0000000000572000-memory.dmpFilesize
196KB