Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
26s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 02:40 UTC
Static task
static1
Behavioral task
behavioral1
Sample
5496793f22bbb7bbb4565ea59b030347.dll
Resource
win7-20231215-en
General
-
Target
5496793f22bbb7bbb4565ea59b030347.dll
-
Size
331KB
-
MD5
5496793f22bbb7bbb4565ea59b030347
-
SHA1
ce9dbf9d30e69fce1f4e073c7b40a6c621f48b45
-
SHA256
ed10657f650385525ea57c26db2af4cd512e40b94fb8eeec2ccd77454162c1c7
-
SHA512
9a1f04be5c87fefdbab7c438da3fd9253e2c24ba409c9ad8dac68bd78373befd7ac566aebc377562fd309d843dc379391c420f3842d2c32fe6e0df920a805f94
-
SSDEEP
6144:bsGb+3pkbr68feSS65+RH9IgOmUQdOfAZ3xirQAX57LIgbo:ov3pMrVfeS5+RtIxKWQA9jb
Malware Config
Extracted
trickbot
100019
rob127
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2884 2932 WerFault.exe 16 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3704 wermgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4616 wrote to memory of 2932 4616 rundll32.exe 16 PID 4616 wrote to memory of 2932 4616 rundll32.exe 16 PID 4616 wrote to memory of 2932 4616 rundll32.exe 16 PID 2932 wrote to memory of 2152 2932 rundll32.exe 99 PID 2932 wrote to memory of 2152 2932 rundll32.exe 99 PID 2932 wrote to memory of 2152 2932 rundll32.exe 99 PID 2932 wrote to memory of 3704 2932 rundll32.exe 98 PID 2932 wrote to memory of 3704 2932 rundll32.exe 98 PID 2932 wrote to memory of 3704 2932 rundll32.exe 98 PID 2932 wrote to memory of 3704 2932 rundll32.exe 98
Processes
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5496793f22bbb7bbb4565ea59b030347.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 7162⤵
- Program crash
PID:2884
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5496793f22bbb7bbb4565ea59b030347.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2932 -ip 29321⤵PID:1796
Network
-
Remote address:8.8.8.8:53Request1.181.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request57.169.31.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request41.110.16.96.in-addr.arpaIN PTRResponse41.110.16.96.in-addr.arpaIN PTRa96-16-110-41deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.241.123.92.in-addr.arpaIN PTRResponse104.241.123.92.in-addr.arpaIN PTRa92-123-241-104deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request119.110.54.20.in-addr.arpaIN PTR
-
-
-
-
-
-
-
-
-
-
-
-
-
52 B 1
-
43.3kB 2.2MB 860 1566
-
52 B 1
-
52 B 1
-
52 B 1
-
71 B 157 B 1 1
DNS Request
1.181.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
146.78.124.51.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
57.169.31.20.in-addr.arpa
DNS Request
57.169.31.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
41.110.16.96.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
104.241.123.92.in-addr.arpa
-
72 B 1
DNS Request
119.110.54.20.in-addr.arpa
-
-
-
-
-