Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae.dll
Resource
win7-20240903-en
General
-
Target
839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae.dll
-
Size
698KB
-
MD5
d7ebdeef5b5547cf40be7ec12cc649ff
-
SHA1
72a37f41c05176e372acca322bcffd72fc384a7a
-
SHA256
839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae
-
SHA512
8640ef81d27797f25f28c4c0a49ba16241bbd5c7f3a5c5923b02a3323b151d0197d8e1dff236c395a0031f0f872b072274158310e11dde28162262db8a08e176
-
SSDEEP
12288:iMi/XYchVvkJiSA0aVEE72PdnF1dvierYhZ/faplM9VVEKbVW:iMQoc3vkoSAxS3HvnplYVVEKRW
Malware Config
Extracted
trickbot
100018
rob104
38.110.103.124:443
185.56.76.28:443
204.138.26.60:443
60.51.47.65:443
74.85.157.139:443
68.69.26.182:443
38.110.103.136:443
38.110.103.18:443
138.34.28.219:443
185.56.76.94:443
217.115.240.248:443
24.162.214.166:443
80.15.2.105:443
154.58.23.192:443
38.110.100.104:443
45.36.99.184:443
185.56.76.108:443
185.56.76.72:443
138.34.28.35:443
97.83.40.67:443
38.110.103.113:443
38.110.100.142:443
184.74.99.214:443
103.105.254.17:443
62.99.76.213:443
82.159.149.52:443
38.110.100.33:443
38.110.100.242:443
185.13.79.3:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
wermgr.exedescription pid Process Token: SeDebugPrivilege 2024 wermgr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
rundll32.exerundll32.exedescription pid Process procid_target PID 728 wrote to memory of 3252 728 rundll32.exe 83 PID 728 wrote to memory of 3252 728 rundll32.exe 83 PID 728 wrote to memory of 3252 728 rundll32.exe 83 PID 3252 wrote to memory of 5048 3252 rundll32.exe 87 PID 3252 wrote to memory of 5048 3252 rundll32.exe 87 PID 3252 wrote to memory of 5048 3252 rundll32.exe 87 PID 3252 wrote to memory of 2024 3252 rundll32.exe 88 PID 3252 wrote to memory of 2024 3252 rundll32.exe 88 PID 3252 wrote to memory of 2024 3252 rundll32.exe 88 PID 3252 wrote to memory of 2024 3252 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\839dcc7849f805817f5e20d790b03b4105f249b0efc68d42b633deb90fb0c1ae.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe3⤵PID:5048
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-