Analysis
-
max time kernel
110s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
02c421f177d1b0d59fb7bba60c3228f0N.exe
Resource
win7-20240704-en
General
-
Target
02c421f177d1b0d59fb7bba60c3228f0N.exe
-
Size
284KB
-
MD5
02c421f177d1b0d59fb7bba60c3228f0
-
SHA1
a80a58263261ca141b98ad7465b6098714dd638c
-
SHA256
a621dce9e78adce5997eab193ebf0c6b6292bfa4fc682d19d861e7b225e74de8
-
SHA512
2c5870a6cbcb9cf03f011cc7e6d20c614d436e530399eae2623281f7a1e8bacfc1091bbe62e1665c0bf7680c33662caba2a2bc41ad7310130f31197ccacf93a9
-
SSDEEP
3072:0o+xl5oF/eFtetnRQqKpGV8EwaVqwp97y84C0l1hHBBi3Xkjd+1txKwYSOyfJvYp:0o+hoF/eYREqZVx9Gf9Hb43JvYS1T63
Malware Config
Extracted
trickbot
2000030
lib107
196.43.106.38:443
186.97.172.178:443
37.228.70.134:443
144.48.139.206:443
190.110.179.139:443
172.105.15.152:443
177.67.137.111:443
27.72.107.215:443
186.66.15.10:443
189.206.78.155:443
202.131.227.229:443
185.9.187.10:443
196.41.57.46:443
212.200.25.118:443
197.254.14.238:443
45.229.71.211:443
181.167.217.53:443
181.129.116.58:443
185.189.55.207:443
172.104.241.29:443
14.241.244.60:443
144.48.138.213:443
202.138.242.7:443
202.166.196.111:443
36.94.100.202:443
187.19.167.233:443
181.129.242.202:443
36.94.27.124:443
43.245.216.116:443
186.225.63.18:443
41.77.134.250:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02c421f177d1b0d59fb7bba60c3228f0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2876 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2704 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 30 PID 2840 wrote to memory of 2704 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 30 PID 2840 wrote to memory of 2704 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 30 PID 2840 wrote to memory of 2704 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 30 PID 2840 wrote to memory of 3012 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 31 PID 2840 wrote to memory of 3012 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 31 PID 2840 wrote to memory of 3012 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 31 PID 2840 wrote to memory of 3012 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 31 PID 2840 wrote to memory of 2876 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 32 PID 2840 wrote to memory of 2876 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 32 PID 2840 wrote to memory of 2876 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 32 PID 2840 wrote to memory of 2876 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 32 PID 2840 wrote to memory of 2876 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 32 PID 2840 wrote to memory of 2876 2840 02c421f177d1b0d59fb7bba60c3228f0N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c421f177d1b0d59fb7bba60c3228f0N.exe"C:\Users\Admin\AppData\Local\Temp\02c421f177d1b0d59fb7bba60c3228f0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:2704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:3012
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2876
-