Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae.dll
Resource
win7-20240903-en
General
-
Target
839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae.dll
-
Size
698KB
-
MD5
d7ebdeef5b5547cf40be7ec12cc649ff
-
SHA1
72a37f41c05176e372acca322bcffd72fc384a7a
-
SHA256
839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae
-
SHA512
8640ef81d27797f25f28c4c0a49ba16241bbd5c7f3a5c5923b02a3323b151d0197d8e1dff236c395a0031f0f872b072274158310e11dde28162262db8a08e176
-
SSDEEP
12288:iMi/XYchVvkJiSA0aVEE72PdnF1dvierYhZ/faplM9VVEKbVW:iMQoc3vkoSAxS3HvnplYVVEKRW
Malware Config
Extracted
trickbot
100018
rob104
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid Process Token: SeDebugPrivilege 2696 wermgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 1420 wrote to memory of 2692 1420 rundll32.exe 30 PID 1420 wrote to memory of 2692 1420 rundll32.exe 30 PID 1420 wrote to memory of 2692 1420 rundll32.exe 30 PID 1420 wrote to memory of 2692 1420 rundll32.exe 30 PID 1420 wrote to memory of 2692 1420 rundll32.exe 30 PID 1420 wrote to memory of 2692 1420 rundll32.exe 30 PID 1420 wrote to memory of 2692 1420 rundll32.exe 30 PID 2692 wrote to memory of 2704 2692 rundll32.exe 31 PID 2692 wrote to memory of 2704 2692 rundll32.exe 31 PID 2692 wrote to memory of 2704 2692 rundll32.exe 31 PID 2692 wrote to memory of 2704 2692 rundll32.exe 31 PID 2692 wrote to memory of 2696 2692 rundll32.exe 32 PID 2692 wrote to memory of 2696 2692 rundll32.exe 32 PID 2692 wrote to memory of 2696 2692 rundll32.exe 32 PID 2692 wrote to memory of 2696 2692 rundll32.exe 32 PID 2692 wrote to memory of 2696 2692 rundll32.exe 32 PID 2692 wrote to memory of 2696 2692 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:2704
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-