Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
sfc8b4.exe
Resource
win7-20241023-en
General
-
Target
sfc8b4.exe
-
Size
788KB
-
MD5
a5a28b55cd644c7b83b4641c4fdbf3a5
-
SHA1
772851debc5ef85a750577ebbae3cf3592c0b3ce
-
SHA256
58c4bea082b2f44f0beab5356ae2bc9bc73c3f13ab0491861bc2ba24690da103
-
SHA512
72ab2ba476428714985da8d51d4a65dee188df05310202b49d7f19645bd316266a9744343d22482d45b7bdd18520395aefb5f5eab16f39633cadac675bbf5695
-
SSDEEP
12288:NCuLlTqCXDuZIqzb3hKRhMLLUVo6huqjp:NCuAn3hK3MLLU1h99
Malware Config
Extracted
trickbot
2000014
mor137
103.127.165.250:449
103.109.78.174:449
199.38.120.89:449
103.206.128.121:449
199.38.120.91:443
199.38.121.150:443
199.38.123.58:443
208.86.162.215:443
208.86.161.113:443
208.86.162.241:443
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfc8b4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2372 sfc8b4.exe 2372 sfc8b4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2784 2372 sfc8b4.exe 30 PID 2372 wrote to memory of 2784 2372 sfc8b4.exe 30 PID 2372 wrote to memory of 2784 2372 sfc8b4.exe 30 PID 2372 wrote to memory of 2784 2372 sfc8b4.exe 30 PID 2372 wrote to memory of 2784 2372 sfc8b4.exe 30 PID 2372 wrote to memory of 2784 2372 sfc8b4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\sfc8b4.exe"C:\Users\Admin\AppData\Local\Temp\sfc8b4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-