Analysis
-
max time kernel
176s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
37414e9054e872f98444f8c5f5ab02b6.exe
Resource
win7-20231215-en
General
-
Target
37414e9054e872f98444f8c5f5ab02b6.exe
-
Size
577KB
-
MD5
37414e9054e872f98444f8c5f5ab02b6
-
SHA1
bb0eff99d9c2329221a9a3709a944da9f19e56b3
-
SHA256
d194827abd2921b2cd29775c574de483a68d8d6669c96d1e55f291a3a9824a3c
-
SHA512
a5e8a95b9f72524f185d2efeec867d05df6cf5cb6855e681c0646bb136195f06fd2be0311d5496ca516ce7e85ec56de25dd2d5ad4c3ebb5193f09bd7ded37f58
-
SSDEEP
12288:Y7Uf8oOcZoqp4VKC/b1GqvDTUZ4YAGbThGb:Y7UflLs/b1GqvDTUaYAGbTwb
Malware Config
Extracted
trickbot
2000033
lib156
179.42.137.102:443
191.36.152.198:443
179.42.137.104:443
179.42.137.106:443
179.42.137.108:443
202.183.12.124:443
194.190.18.122:443
103.56.207.230:443
171.103.187.218:449
171.103.189.118:449
18.139.111.104:443
179.42.137.105:443
186.4.193.75:443
171.101.229.2:449
179.42.137.107:443
103.56.43.209:449
179.42.137.110:443
45.181.207.156:443
197.44.54.162:449
179.42.137.109:443
103.59.105.226:449
45.181.207.101:443
117.196.236.205:443
72.224.45.102:449
179.42.137.111:443
96.47.239.181:443
171.100.112.190:449
117.196.239.6:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\DefaultIcon 37414e9054e872f98444f8c5f5ab02b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\37414E~1.EXE,1" 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell\printto\command 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell\printto 37414e9054e872f98444f8c5f5ab02b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\37414E~1.EXE /pt \"%1\" \"%2\" \"%3\" \"%4\"" 37414e9054e872f98444f8c5f5ab02b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wdg\ = "Widget.Document" 37414e9054e872f98444f8c5f5ab02b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\ = "Widget Document" 37414e9054e872f98444f8c5f5ab02b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\37414E~1.EXE \"%1\"" 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell\print\command 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wdg 37414e9054e872f98444f8c5f5ab02b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.wdg\ShellNew\NullFile 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell\open\command 37414e9054e872f98444f8c5f5ab02b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\37414E~1.EXE /p \"%1\"" 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wdg\ShellNew 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell\open 37414e9054e872f98444f8c5f5ab02b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Widget.Document\shell\print 37414e9054e872f98444f8c5f5ab02b6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 324 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3532 37414e9054e872f98444f8c5f5ab02b6.exe 3532 37414e9054e872f98444f8c5f5ab02b6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3532 wrote to memory of 324 3532 37414e9054e872f98444f8c5f5ab02b6.exe 91 PID 3532 wrote to memory of 324 3532 37414e9054e872f98444f8c5f5ab02b6.exe 91 PID 3532 wrote to memory of 2592 3532 37414e9054e872f98444f8c5f5ab02b6.exe 92 PID 3532 wrote to memory of 2592 3532 37414e9054e872f98444f8c5f5ab02b6.exe 92 PID 3532 wrote to memory of 324 3532 37414e9054e872f98444f8c5f5ab02b6.exe 91 PID 3532 wrote to memory of 324 3532 37414e9054e872f98444f8c5f5ab02b6.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\37414e9054e872f98444f8c5f5ab02b6.exe"C:\Users\Admin\AppData\Local\Temp\37414e9054e872f98444f8c5f5ab02b6.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:2592
-