Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 11:26
Static task
static1
Behavioral task
behavioral1
Sample
3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34.dll
Resource
win7-20240903-en
General
-
Target
3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34.dll
-
Size
575KB
-
MD5
6b0ecac2a29b51b92bb975139ca30a15
-
SHA1
793e58e74ce2b1a3f946b0ae3a1b47a526a34f1e
-
SHA256
3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34
-
SHA512
f3d8f3f507e757096b5c20d0f60e528d48420127704a6a5b56fda2d3b5be739864cdef220fc9d0dbc2dad378e017c633df926b75541661a58b0607d557596480
-
SSDEEP
12288:3ehGJ42avyNaQCCelzyjtxGq8jtzVPEPC9YuuCFAF+4+AaHB7qMTbA86tOk+:3ehcNOCex9iJLaBhT8t
Malware Config
Extracted
trickbot
100018
rob107
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4312 3252 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2016 wermgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 388 wrote to memory of 3252 388 rundll32.exe 83 PID 388 wrote to memory of 3252 388 rundll32.exe 83 PID 388 wrote to memory of 3252 388 rundll32.exe 83 PID 3252 wrote to memory of 2672 3252 rundll32.exe 87 PID 3252 wrote to memory of 2672 3252 rundll32.exe 87 PID 3252 wrote to memory of 2672 3252 rundll32.exe 87 PID 3252 wrote to memory of 2016 3252 rundll32.exe 88 PID 3252 wrote to memory of 2016 3252 rundll32.exe 88 PID 3252 wrote to memory of 2016 3252 rundll32.exe 88 PID 3252 wrote to memory of 2016 3252 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3fb7bbdb95c1a65a988627832b55bb227faa7d5ae35ad56865c8b02a09ccba34.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:2672
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 6803⤵
- Program crash
PID:4312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3252 -ip 32521⤵PID:3592