Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 11:26
Static task
static1
Behavioral task
behavioral1
Sample
3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34.dll
Resource
win7-20240903-en
General
-
Target
3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34.dll
-
Size
575KB
-
MD5
6b0ecac2a29b51b92bb975139ca30a15
-
SHA1
793e58e74ce2b1a3f946b0ae3a1b47a526a34f1e
-
SHA256
3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34
-
SHA512
f3d8f3f507e757096b5c20d0f60e528d48420127704a6a5b56fda2d3b5be739864cdef220fc9d0dbc2dad378e017c633df926b75541661a58b0607d557596480
-
SSDEEP
12288:3ehGJ42avyNaQCCelzyjtxGq8jtzVPEPC9YuuCFAF+4+AaHB7qMTbA86tOk+:3ehcNOCex9iJLaBhT8t
Malware Config
Extracted
trickbot
100018
rob107
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2448 wermgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2440 wrote to memory of 2900 2440 rundll32.exe 28 PID 2900 wrote to memory of 308 2900 rundll32.exe 29 PID 2900 wrote to memory of 308 2900 rundll32.exe 29 PID 2900 wrote to memory of 308 2900 rundll32.exe 29 PID 2900 wrote to memory of 308 2900 rundll32.exe 29 PID 2900 wrote to memory of 2448 2900 rundll32.exe 30 PID 2900 wrote to memory of 2448 2900 rundll32.exe 30 PID 2900 wrote to memory of 2448 2900 rundll32.exe 30 PID 2900 wrote to memory of 2448 2900 rundll32.exe 30 PID 2900 wrote to memory of 2448 2900 rundll32.exe 30 PID 2900 wrote to memory of 2448 2900 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:308
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-