Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 11:53
Static task
static1
Behavioral task
behavioral1
Sample
6c55a8fbce2e51de2ed495483d02d014.dll
Resource
win7-20231215-en
General
-
Target
6c55a8fbce2e51de2ed495483d02d014.dll
-
Size
600KB
-
MD5
6c55a8fbce2e51de2ed495483d02d014
-
SHA1
a798174893e509dbb303e5be89afc03de064e2ff
-
SHA256
42518da60fb7d25e049276afc797db54c9678ed87d6e69ac5a53b668c4bdd410
-
SHA512
bd90838deb353e40d39ae7fdd88ea67781b514b88799cfbdb106b64c5967deb991500e3f619a53e22f342e49192c0e13a8e04a306836bd51e79ae609a7e7a297
-
SSDEEP
12288:SubYNTW0k3QRsYgUKkFj60KBQEq4OJZ+133UsdVzkZ2QWVH47xpEwYAd:VbiY3QRmZkFj60KBQEqDk1UsdlcKVYFZ
Malware Config
Extracted
trickbot
2000031
zev4
14.232.161.45:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 wermgr.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3116 2068 regsvr32.exe 90 PID 2068 wrote to memory of 3116 2068 regsvr32.exe 90 PID 2068 wrote to memory of 3116 2068 regsvr32.exe 90 PID 3116 wrote to memory of 2660 3116 regsvr32.exe 96 PID 3116 wrote to memory of 2660 3116 regsvr32.exe 96 PID 3116 wrote to memory of 2660 3116 regsvr32.exe 96 PID 3116 wrote to memory of 2660 3116 regsvr32.exe 96
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6c55a8fbce2e51de2ed495483d02d014.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6c55a8fbce2e51de2ed495483d02d014.dll2⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-