Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
d071412ba45aa00c7be1b5ade25acd20N.exe
Resource
win7-20240704-en
General
-
Target
d071412ba45aa00c7be1b5ade25acd20N.exe
-
Size
824KB
-
MD5
d071412ba45aa00c7be1b5ade25acd20
-
SHA1
65d062c65c68bd342fe58f65dc7091034e8f6a8a
-
SHA256
76c3eee6cdd2ecc3011228e7c44955b5312e61d4933353f8ccb850a568b93bc6
-
SHA512
4ecf282f3362bd990d94d0fa68a65fc56ba57de8e8c45954dab964adde7d5164f39012757a3f591b40b5a094545e094b795981459878572c2db330915722cecc
-
SSDEEP
12288:kV8I9SdTOyLCQwGbgNBuoWyae8sOTT/FeJgDXwZknTwTfyxKNJh:kAdJLCSc8sOTT/FenIsfya3
Malware Config
Extracted
trickbot
2000031
tot122
14.232.161.45:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d071412ba45aa00c7be1b5ade25acd20N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d071412ba45aa00c7be1b5ade25acd20N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 2904 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d071412ba45aa00c7be1b5ade25acd20N.exepid process 3012 d071412ba45aa00c7be1b5ade25acd20N.exe 3012 d071412ba45aa00c7be1b5ade25acd20N.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
d071412ba45aa00c7be1b5ade25acd20N.exedescription pid process target process PID 3012 wrote to memory of 2904 3012 d071412ba45aa00c7be1b5ade25acd20N.exe wermgr.exe PID 3012 wrote to memory of 2904 3012 d071412ba45aa00c7be1b5ade25acd20N.exe wermgr.exe PID 3012 wrote to memory of 2904 3012 d071412ba45aa00c7be1b5ade25acd20N.exe wermgr.exe PID 3012 wrote to memory of 2904 3012 d071412ba45aa00c7be1b5ade25acd20N.exe wermgr.exe PID 3012 wrote to memory of 3024 3012 d071412ba45aa00c7be1b5ade25acd20N.exe cmd.exe PID 3012 wrote to memory of 3024 3012 d071412ba45aa00c7be1b5ade25acd20N.exe cmd.exe PID 3012 wrote to memory of 3024 3012 d071412ba45aa00c7be1b5ade25acd20N.exe cmd.exe PID 3012 wrote to memory of 3024 3012 d071412ba45aa00c7be1b5ade25acd20N.exe cmd.exe PID 3012 wrote to memory of 2904 3012 d071412ba45aa00c7be1b5ade25acd20N.exe wermgr.exe PID 3012 wrote to memory of 2904 3012 d071412ba45aa00c7be1b5ade25acd20N.exe wermgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d071412ba45aa00c7be1b5ade25acd20N.exe"C:\Users\Admin\AppData\Local\Temp\d071412ba45aa00c7be1b5ade25acd20N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2904 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:3024