Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
02c421f177d1b0d59fb7bba60c3228f0N.exe
Resource
win7-20240704-en
General
-
Target
02c421f177d1b0d59fb7bba60c3228f0N.exe
-
Size
284KB
-
MD5
02c421f177d1b0d59fb7bba60c3228f0
-
SHA1
a80a58263261ca141b98ad7465b6098714dd638c
-
SHA256
a621dce9e78adce5997eab193ebf0c6b6292bfa4fc682d19d861e7b225e74de8
-
SHA512
2c5870a6cbcb9cf03f011cc7e6d20c614d436e530399eae2623281f7a1e8bacfc1091bbe62e1665c0bf7680c33662caba2a2bc41ad7310130f31197ccacf93a9
-
SSDEEP
3072:0o+xl5oF/eFtetnRQqKpGV8EwaVqwp97y84C0l1hHBBi3Xkjd+1txKwYSOyfJvYp:0o+hoF/eYREqZVx9Gf9Hb43JvYS1T63
Malware Config
Extracted
trickbot
2000030
lib107
196.43.106.38:443
186.97.172.178:443
37.228.70.134:443
144.48.139.206:443
190.110.179.139:443
172.105.15.152:443
177.67.137.111:443
27.72.107.215:443
186.66.15.10:443
189.206.78.155:443
202.131.227.229:443
185.9.187.10:443
196.41.57.46:443
212.200.25.118:443
197.254.14.238:443
45.229.71.211:443
181.167.217.53:443
181.129.116.58:443
185.189.55.207:443
172.104.241.29:443
14.241.244.60:443
144.48.138.213:443
202.138.242.7:443
202.166.196.111:443
36.94.100.202:443
187.19.167.233:443
181.129.242.202:443
36.94.27.124:443
43.245.216.116:443
186.225.63.18:443
41.77.134.250:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 428 4116 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02c421f177d1b0d59fb7bba60c3228f0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 964 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4116 wrote to memory of 2352 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe 95 PID 4116 wrote to memory of 2352 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe 95 PID 4116 wrote to memory of 1776 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe 96 PID 4116 wrote to memory of 1776 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe 96 PID 4116 wrote to memory of 964 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe 97 PID 4116 wrote to memory of 964 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe 97 PID 4116 wrote to memory of 964 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe 97 PID 4116 wrote to memory of 964 4116 02c421f177d1b0d59fb7bba60c3228f0N.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c421f177d1b0d59fb7bba60c3228f0N.exe"C:\Users\Admin\AppData\Local\Temp\02c421f177d1b0d59fb7bba60c3228f0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:2352
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe2⤵PID:1776
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 5402⤵
- Program crash
PID:428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4116 -ip 41161⤵PID:2848