Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 07:08
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20230712-en
General
-
Target
3.exe
-
Size
432KB
-
MD5
7773c8164949a42936c4d1374cf16284
-
SHA1
9e92535dc7bcdd7bf677a643f90ee730784edfc6
-
SHA256
81fa8a3bdc452dd2b279b61fed92fe83d65e650e06bca9ee4dfcf991a4a59e77
-
SHA512
8569116004d7b7154fced5a1a6f9d6ed111cae4cf71a68942fc0b978f5fb42db5b595c059fa77bd787cb923c99894dfc07accbc201c38caa02e3f2a235a9d61c
-
SSDEEP
6144:K7SsTkhdodKqFnpNB0ZBPpYbDhk2N+mBN0fmWbli/eQ8CAFCKz62bxMP7RTitG:WmhdSHZoY/y2MM0fm6lfQIR62lM9iA
Malware Config
Extracted
trickbot
1000512
yas45
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Dave packer 2 IoCs
Detects executable using a packer named 'Dave' by the community, based on a string at the end.
resource yara_rule behavioral2/memory/4028-0-0x0000000002990000-0x00000000029C7000-memory.dmp dave behavioral2/memory/4028-1-0x0000000002320000-0x0000000002354000-memory.dmp dave -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4028 3.exe 4028 3.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4048 wermgr.exe Token: SeDebugPrivilege 4048 wermgr.exe Token: SeDebugPrivilege 4048 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4028 3.exe 4028 3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4028 wrote to memory of 4048 4028 3.exe 91 PID 4028 wrote to memory of 4048 4028 3.exe 91 PID 4028 wrote to memory of 4048 4028 3.exe 91 PID 4028 wrote to memory of 4048 4028 3.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4048
-