Overview
overview
10Static
static
32021021216...8f.dll
windows7-x64
32021021216...8f.dll
windows10-2004-x64
32021021216...8c.dll
windows7-x64
102021021216...8c.dll
windows10-2004-x64
102021021216...d5.dll
windows7-x64
102021021216...d5.dll
windows10-2004-x64
102021021216...f7.dll
windows7-x64
102021021216...f7.dll
windows10-2004-x64
102021021216...3d.dll
windows7-x64
102021021216...3d.dll
windows10-2004-x64
102021021216...63.dll
windows7-x64
102021021216...63.dll
windows10-2004-x64
102021021216...1d.dll
windows7-x64
102021021216...1d.dll
windows10-2004-x64
102021021216...73.dll
windows7-x64
102021021216...73.dll
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 17:34
Static task
static1
Behavioral task
behavioral1
Sample
202102121641_48eacf290c0ed6287672551fcf426053f754c126c01fe6a01009c0ba599d3b8f.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
202102121641_48eacf290c0ed6287672551fcf426053f754c126c01fe6a01009c0ba599d3b8f.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
202102121641_4b32c3c2d28237ba331ae94e7fe4dfb566a0902d59eb84aa793b3adf0a5f378c.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
202102121641_4b32c3c2d28237ba331ae94e7fe4dfb566a0902d59eb84aa793b3adf0a5f378c.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
202102121641_7ae7db00b573a89b9c435a5147a265dd939d99552b92b5dd9baa9a16f95ae9d5.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
202102121641_7ae7db00b573a89b9c435a5147a265dd939d99552b92b5dd9baa9a16f95ae9d5.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
202102121641_8600b6aff4ee95d4f78e5dc77f66af3c07241db926b053144943361bc64c37f7.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
202102121641_8600b6aff4ee95d4f78e5dc77f66af3c07241db926b053144943361bc64c37f7.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
202102121641_ae55975bd40147ab3b9a02f1e2e0279f714bce9845d26ace252cd590a42d733d.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
202102121641_ae55975bd40147ab3b9a02f1e2e0279f714bce9845d26ace252cd590a42d733d.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
202102121641_c642dca14e48cae8391d5f100304b399b70a9c3967d7b7d3949ead3b96ba1a63.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
202102121641_c642dca14e48cae8391d5f100304b399b70a9c3967d7b7d3949ead3b96ba1a63.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
202102121641_cc849b895a0c8237f81ca3fe6395929713fb7b3f0a7744d3ddc3cb08f9f4351d.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
202102121641_cc849b895a0c8237f81ca3fe6395929713fb7b3f0a7744d3ddc3cb08f9f4351d.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
202102121641_f1b9d5520ba13179e19b336e542d18b0bd9f39a2b41d88a739625c8480422b73.dll
Resource
win7-20241010-en
General
-
Target
202102121641_7ae7db00b573a89b9c435a5147a265dd939d99552b92b5dd9baa9a16f95ae9d5.dll
-
Size
300KB
-
MD5
d564753c69c611fb485af9b66b967630
-
SHA1
056f88c4f7f0ed8f746f36f3cc37961c606bbf40
-
SHA256
7ae7db00b573a89b9c435a5147a265dd939d99552b92b5dd9baa9a16f95ae9d5
-
SHA512
ade094db28924395908b6afff429ae716e0f58b7a4eef04f835bef5bff5e476c0fd3754ac94cb6810b67d6c666995e0fc45c05da33bf48a3a9b7f1dac17ddeea
-
SSDEEP
6144:1YLvUrbTO4P+kKBsuxBFcID9jG8yffrngnJ0qE1uyGjAkeIJ2:+gLO4PP+seLcg9K8jJ0qnFJ2
Malware Config
Extracted
trickbot
100011
mon42
194.5.249.156:443
142.202.191.164:443
193.8.194.96:443
45.155.173.242:443
108.170.20.75:443
185.163.45.138:443
94.140.114.136:443
134.119.186.202:443
200.52.147.93:443
45.230.244.20:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
resource yara_rule behavioral5/memory/2224-1-0x0000000000180000-0x00000000001B7000-memory.dmp templ_dll -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2912 wermgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1128 wrote to memory of 2224 1128 regsvr32.exe 30 PID 1128 wrote to memory of 2224 1128 regsvr32.exe 30 PID 1128 wrote to memory of 2224 1128 regsvr32.exe 30 PID 1128 wrote to memory of 2224 1128 regsvr32.exe 30 PID 1128 wrote to memory of 2224 1128 regsvr32.exe 30 PID 1128 wrote to memory of 2224 1128 regsvr32.exe 30 PID 1128 wrote to memory of 2224 1128 regsvr32.exe 30 PID 2224 wrote to memory of 1224 2224 regsvr32.exe 31 PID 2224 wrote to memory of 1224 2224 regsvr32.exe 31 PID 2224 wrote to memory of 1224 2224 regsvr32.exe 31 PID 2224 wrote to memory of 1224 2224 regsvr32.exe 31 PID 2224 wrote to memory of 2912 2224 regsvr32.exe 32 PID 2224 wrote to memory of 2912 2224 regsvr32.exe 32 PID 2224 wrote to memory of 2912 2224 regsvr32.exe 32 PID 2224 wrote to memory of 2912 2224 regsvr32.exe 32 PID 2224 wrote to memory of 2912 2224 regsvr32.exe 32 PID 2224 wrote to memory of 2912 2224 regsvr32.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\202102121641_7ae7db00b573a89b9c435a5147a265dd939d99552b92b5dd9baa9a16f95ae9d5.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\202102121641_7ae7db00b573a89b9c435a5147a265dd939d99552b92b5dd9baa9a16f95ae9d5.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵PID:1224
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-