Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-12-2023 12:35
Static task
static1
Behavioral task
behavioral1
Sample
247e61850d8993b144d81bf375465663.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
247e61850d8993b144d81bf375465663.exe
Resource
win10v2004-20231201-en
General
-
Target
247e61850d8993b144d81bf375465663.exe
-
Size
432KB
-
MD5
247e61850d8993b144d81bf375465663
-
SHA1
bea76324c03f077d987478c29bef1fa8fbc0d3b8
-
SHA256
cea855439b925ac4f02f989a63c7e77022655d1874c721d29622dca6930ee6ad
-
SHA512
905b6a537f1934954cbf8c7856e17229edbc46235cc6e8b6fde31d5981198818d7c8156776d1d8201e14e648288462fa417f826d6463affd3fccfe172bd64766
-
SSDEEP
6144:wkdJN4c+ePGc7r1tJ3VQl/XE3dAPr3x7835OPeFPQimA6Vk58qVEb9pEy:wkdJLbP1tlCl/XIIx/lbVMlG1
Malware Config
Extracted
trickbot
100019
top128
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2196 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2224 247e61850d8993b144d81bf375465663.exe 2224 247e61850d8993b144d81bf375465663.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2196 2224 247e61850d8993b144d81bf375465663.exe 28 PID 2224 wrote to memory of 2196 2224 247e61850d8993b144d81bf375465663.exe 28 PID 2224 wrote to memory of 2196 2224 247e61850d8993b144d81bf375465663.exe 28 PID 2224 wrote to memory of 2196 2224 247e61850d8993b144d81bf375465663.exe 28 PID 2224 wrote to memory of 2900 2224 247e61850d8993b144d81bf375465663.exe 29 PID 2224 wrote to memory of 2900 2224 247e61850d8993b144d81bf375465663.exe 29 PID 2224 wrote to memory of 2900 2224 247e61850d8993b144d81bf375465663.exe 29 PID 2224 wrote to memory of 2900 2224 247e61850d8993b144d81bf375465663.exe 29 PID 2224 wrote to memory of 2196 2224 247e61850d8993b144d81bf375465663.exe 28 PID 2224 wrote to memory of 2196 2224 247e61850d8993b144d81bf375465663.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\247e61850d8993b144d81bf375465663.exe"C:\Users\Admin\AppData\Local\Temp\247e61850d8993b144d81bf375465663.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:2900
-