Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
8075598d8961d6db6928cc3995b1b930.exe
Resource
win7-20231215-en
General
-
Target
8075598d8961d6db6928cc3995b1b930.exe
-
Size
516KB
-
MD5
8075598d8961d6db6928cc3995b1b930
-
SHA1
30265119bdd38184155bc97e1cc241d04ab7d506
-
SHA256
ba0ecd9c31ae3a6f9de54000d94914c0cedc90434800c99dc569074a81c8060f
-
SHA512
171186e1b50ab3591ac8794a1704bb926da59c2fead2585d99ddaa6399bbec4904afd175e2dbfb0cae894bd7ba168cbdbbbba10d54ac0befafbe5297dd892783
-
SSDEEP
6144:RXLe/O1uv3zx8oTluidsZ7RV9Wsy2r12rCxabgxPO29nLeEdfNpSqZgUqUqi3Y:Ze/O1s1jxuiMWsrroryxbhTd+aUk
Malware Config
Extracted
trickbot
100019
top116
65.152.201.203:443
185.56.175.122:443
46.99.175.217:443
179.189.229.254:443
46.99.175.149:443
181.129.167.82:443
216.166.148.187:443
46.99.188.223:443
128.201.76.252:443
62.99.79.77:443
60.51.47.65:443
24.162.214.166:443
45.36.99.184:443
97.83.40.67:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1720 8075598d8961d6db6928cc3995b1b930.exe 1720 8075598d8961d6db6928cc3995b1b930.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2704 1720 8075598d8961d6db6928cc3995b1b930.exe 28 PID 1720 wrote to memory of 2704 1720 8075598d8961d6db6928cc3995b1b930.exe 28 PID 1720 wrote to memory of 2704 1720 8075598d8961d6db6928cc3995b1b930.exe 28 PID 1720 wrote to memory of 2704 1720 8075598d8961d6db6928cc3995b1b930.exe 28 PID 1720 wrote to memory of 1640 1720 8075598d8961d6db6928cc3995b1b930.exe 29 PID 1720 wrote to memory of 1640 1720 8075598d8961d6db6928cc3995b1b930.exe 29 PID 1720 wrote to memory of 1640 1720 8075598d8961d6db6928cc3995b1b930.exe 29 PID 1720 wrote to memory of 1640 1720 8075598d8961d6db6928cc3995b1b930.exe 29 PID 1720 wrote to memory of 2704 1720 8075598d8961d6db6928cc3995b1b930.exe 28 PID 1720 wrote to memory of 2704 1720 8075598d8961d6db6928cc3995b1b930.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8075598d8961d6db6928cc3995b1b930.exe"C:\Users\Admin\AppData\Local\Temp\8075598d8961d6db6928cc3995b1b930.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:1640
-