Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 06:25
Static task
static1
Behavioral task
behavioral1
Sample
zadyx11.dll
Resource
win7-20241010-en
General
-
Target
zadyx11.dll
-
Size
476KB
-
MD5
f17e75462ba851a3a20f4e7757d171dc
-
SHA1
e64c7a411423677bb91010551563ddc5b1eaa23d
-
SHA256
f679889b095f37aeee12cd03d12435fe63281bff7e61c64370e8a7f7f3a99808
-
SHA512
beafd045fa1112787df9c5e3d6679f8b5d6ae079c082e5f407b945848c2a17cacddccddd0dfa8eb16952ddeed9ac3f28b8bfdf71086f036dba458a1d0ade0b96
-
SSDEEP
12288:pZE+MlbUtn38H+bNdPEIaZc661kd+D/fbx+9KllA:bEKNb/aZl6KdSrs+A
Malware Config
Extracted
trickbot
2000035
zvs1
36.91.117.231:443
36.89.228.201:443
103.75.32.173:443
45.115.172.105:443
36.95.23.89:443
103.123.86.104:443
202.65.119.162:443
202.9.121.143:443
139.255.65.170:443
110.172.137.20:443
103.146.232.154:443
36.91.88.164:443
103.47.170.131:443
122.117.90.133:443
103.9.188.78:443
210.2.149.202:443
118.91.190.42:443
117.222.61.115:443
117.222.57.92:443
136.228.128.21:443
103.47.170.130:443
36.91.186.235:443
103.194.88.4:443
116.206.153.212:443
58.97.72.83:443
139.255.6.2:443
- autorun
Signatures
-
Trickbot family
-
Program crash 1 IoCs
pid pid_target Process procid_target 1224 3868 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3124 wermgr.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1928 wrote to memory of 3868 1928 regsvr32.exe 83 PID 1928 wrote to memory of 3868 1928 regsvr32.exe 83 PID 1928 wrote to memory of 3868 1928 regsvr32.exe 83 PID 3868 wrote to memory of 3124 3868 regsvr32.exe 84 PID 3868 wrote to memory of 3124 3868 regsvr32.exe 84 PID 3868 wrote to memory of 3124 3868 regsvr32.exe 84 PID 3868 wrote to memory of 3124 3868 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\zadyx11.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\zadyx11.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 6483⤵
- Program crash
PID:1224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3868 -ip 38681⤵PID:3012