Analysis
-
max time kernel
170s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 07:23
Static task
static1
Behavioral task
behavioral1
Sample
b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe
Resource
win7-20220414-en
General
-
Target
b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe
-
Size
424KB
-
MD5
1a5431b82e0f025a38cd0b680b47997f
-
SHA1
6b524cd7797ef7d3822dd58f9146ae437d77097c
-
SHA256
b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28
-
SHA512
c4c9f251a6057c5cc58558ddd60148d869c1ba33a9b036eec7514c93d38fc1663473bdf004591527a3ed7a59ede46b100d7a47b74d7e81359dc99b5a6f123db3
Malware Config
Extracted
trickbot
100009
lib5
149.54.11.54:449
36.89.191.119:449
41.159.31.227:449
103.150.68.124:449
103.126.185.7:449
103.112.145.58:449
103.110.53.174:449
102.164.208.44:449
194.5.249.143:443
142.202.191.175:443
195.123.241.31:443
45.89.125.214:443
45.83.151.103:443
91.200.103.41:443
66.70.246.0:443
64.74.160.218:443
198.46.198.115:443
5.34.180.173:443
23.227.196.5:443
195.123.241.115:443
107.152.42.163:443
-
autorunName:pwgrab
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exepid process 3416 b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 4496 wermgr.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exeb607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exedescription pid process target process PID 2408 wrote to memory of 3416 2408 b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe PID 2408 wrote to memory of 3416 2408 b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe PID 2408 wrote to memory of 3416 2408 b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe PID 3416 wrote to memory of 4496 3416 b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe wermgr.exe PID 3416 wrote to memory of 4496 3416 b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe wermgr.exe PID 3416 wrote to memory of 4496 3416 b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe wermgr.exe PID 3416 wrote to memory of 4496 3416 b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe"C:\Users\Admin\AppData\Local\Temp\b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\DesktopColor\b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exeC:\Users\Admin\AppData\Roaming\DesktopColor\b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\DesktopColor\b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exeFilesize
424KB
MD51a5431b82e0f025a38cd0b680b47997f
SHA16b524cd7797ef7d3822dd58f9146ae437d77097c
SHA256b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28
SHA512c4c9f251a6057c5cc58558ddd60148d869c1ba33a9b036eec7514c93d38fc1663473bdf004591527a3ed7a59ede46b100d7a47b74d7e81359dc99b5a6f123db3
-
C:\Users\Admin\AppData\Roaming\DesktopColor\b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28.exeFilesize
424KB
MD51a5431b82e0f025a38cd0b680b47997f
SHA16b524cd7797ef7d3822dd58f9146ae437d77097c
SHA256b607f8b423ae8e8bf9d5b8e9dc586ea5476426b1b581cf481e8d627e5e022a28
SHA512c4c9f251a6057c5cc58558ddd60148d869c1ba33a9b036eec7514c93d38fc1663473bdf004591527a3ed7a59ede46b100d7a47b74d7e81359dc99b5a6f123db3
-
memory/2408-130-0x00000000005A0000-0x00000000005A5000-memory.dmpFilesize
20KB
-
memory/2408-131-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2408-136-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/3416-132-0x0000000000000000-mapping.dmp
-
memory/3416-135-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/3416-139-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/4496-137-0x0000000000000000-mapping.dmp
-
memory/4496-138-0x00000202BA8A0000-0x00000202BA8C7000-memory.dmpFilesize
156KB