Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240903-en
General
-
Target
sample.exe
-
Size
592KB
-
MD5
c338a1e442838cc95a6724f2def934b5
-
SHA1
279e903c173a2f7b34806d931b31369788cd90b9
-
SHA256
df4491307732cc8c20abfa4e86609aaef79ce847563f060bfa73b0dc8dce274a
-
SHA512
c77ba9ec89037537919192737d3cb5315b9070059c328e0d69022183dbd6d8667ab4778ffa52082d95ccb8c9412ad4ebe0f1e6eb090c3fa3cb4c920ae31440b7
-
SSDEEP
12288:G+s6qIJMaGcNT+VGt0i5wRlg5QBBslNweXOYDHUDPXi0pqwK7bCFQOjV:VqIJMdCOYDHUDPinCyC
Malware Config
Extracted
trickbot
2000013
mor133
199.38.120.91:443
199.38.121.150:443
199.38.123.58:443
208.86.162.215:443
208.86.161.113:443
208.86.162.241:443
131.153.22.145:443
62.108.35.29:443
45.89.127.118:443
185.99.2.123:443
62.108.35.36:443
45.89.127.119:443
194.5.249.216:443
185.99.2.160:443
80.85.156.116:443
86.104.194.102:443
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2860 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2696 sample.exe 2696 sample.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2860 2696 sample.exe 30 PID 2696 wrote to memory of 2860 2696 sample.exe 30 PID 2696 wrote to memory of 2860 2696 sample.exe 30 PID 2696 wrote to memory of 2860 2696 sample.exe 30 PID 2696 wrote to memory of 2860 2696 sample.exe 30 PID 2696 wrote to memory of 2860 2696 sample.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2860
-