Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-06-2022 23:28
Static task
static1
Behavioral task
behavioral1
Sample
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe
Resource
win7-20220414-en
General
-
Target
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe
-
Size
556KB
-
MD5
865369af4fc338efdc45d8aa59b90132
-
SHA1
d077fbcf5de5b452ce62c1bdc6d0b81c2d4b28f5
-
SHA256
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08
-
SHA512
5e0c0d37889b5633de7deb01aea023c7431b3a116d1da3950e8c75a436633f3d22cbd10a642a813d4d4be5b410e5c1c9b567452f61745afb6513223bad84c9d5
Malware Config
Extracted
trickbot
1000503
qw6
5.182.210.226:443
192.210.226.106:443
51.254.164.244:443
45.148.120.153:443
195.123.239.67:443
194.5.250.150:443
217.12.209.200:443
185.99.2.221:443
51.254.164.245:443
185.62.188.159:443
46.17.107.65:443
185.20.185.76:443
185.203.118.37:443
146.185.253.178:443
185.14.31.252:443
185.99.2.115:443
172.245.156.138:443
51.89.73.158:443
190.214.13.2:449
181.140.173.186:449
181.129.104.139:449
181.113.28.146:449
181.112.157.42:449
170.84.78.224:449
200.21.51.38:449
46.174.235.36:449
36.89.85.103:449
181.129.134.18:449
186.71.150.23:449
131.161.253.190:449
200.127.121.99:449
114.8.133.71:449
119.252.165.75:449
121.100.19.18:449
202.29.215.114:449
180.180.216.177:449
171.100.142.238:449
186.232.91.240:449
181.196.207.202:449
-
autorunName:pwgrab
Signatures
-
Dave packer 3 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
Processes:
resource yara_rule behavioral2/memory/3032-130-0x0000000002340000-0x0000000002376000-memory.dmp dave behavioral2/memory/3032-134-0x00000000022D0000-0x0000000002313000-memory.dmp dave behavioral2/memory/4564-138-0x0000000002230000-0x0000000002266000-memory.dmp dave -
Executes dropped EXE 1 IoCs
Processes:
ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exepid process 4564 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 4252 svchost.exe Token: SeDebugPrivilege 4252 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exeↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exepid process 3032 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe 3032 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe 4564 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe 4564 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exeↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exedescription pid process target process PID 3032 wrote to memory of 4564 3032 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe PID 3032 wrote to memory of 4564 3032 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe PID 3032 wrote to memory of 4564 3032 0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe PID 4564 wrote to memory of 4252 4564 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe svchost.exe PID 4564 wrote to memory of 4252 4564 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe svchost.exe PID 4564 wrote to memory of 4252 4564 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe svchost.exe PID 4564 wrote to memory of 4252 4564 ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe"C:\Users\Admin\AppData\Local\Temp\0cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe"C:\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exeFilesize
556KB
MD5865369af4fc338efdc45d8aa59b90132
SHA1d077fbcf5de5b452ce62c1bdc6d0b81c2d4b28f5
SHA2560cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08
SHA5125e0c0d37889b5633de7deb01aea023c7431b3a116d1da3950e8c75a436633f3d22cbd10a642a813d4d4be5b410e5c1c9b567452f61745afb6513223bad84c9d5
-
C:\ProgramData\ↈↈCCIƆفيديVCموسيقىCموسيقىC;ↈ;ↈM;.exeFilesize
556KB
MD5865369af4fc338efdc45d8aa59b90132
SHA1d077fbcf5de5b452ce62c1bdc6d0b81c2d4b28f5
SHA2560cac69584eb63de53369675af304834119f7cf915054a950db20613acc4c4b08
SHA5125e0c0d37889b5633de7deb01aea023c7431b3a116d1da3950e8c75a436633f3d22cbd10a642a813d4d4be5b410e5c1c9b567452f61745afb6513223bad84c9d5
-
memory/3032-134-0x00000000022D0000-0x0000000002313000-memory.dmpFilesize
268KB
-
memory/3032-130-0x0000000002340000-0x0000000002376000-memory.dmpFilesize
216KB
-
memory/4252-145-0x0000000000000000-mapping.dmp
-
memory/4252-147-0x000001C9960A0000-0x000001C9960C4000-memory.dmpFilesize
144KB
-
memory/4252-148-0x000001C9960A0000-0x000001C9960C4000-memory.dmpFilesize
144KB
-
memory/4564-138-0x0000000002230000-0x0000000002266000-memory.dmpFilesize
216KB
-
memory/4564-142-0x00000000027F0000-0x0000000002822000-memory.dmpFilesize
200KB
-
memory/4564-143-0x00000000027B0000-0x00000000027E2000-memory.dmpFilesize
200KB
-
memory/4564-144-0x00000000027F1000-0x0000000002822000-memory.dmpFilesize
196KB
-
memory/4564-135-0x0000000000000000-mapping.dmp
-
memory/4564-146-0x0000000010001000-0x0000000010006000-memory.dmpFilesize
20KB
-
memory/4564-149-0x00000000027F1000-0x0000000002822000-memory.dmpFilesize
196KB