Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
sfc8b4.exe
Resource
win7-20241023-en
General
-
Target
sfc8b4.exe
-
Size
788KB
-
MD5
a5a28b55cd644c7b83b4641c4fdbf3a5
-
SHA1
772851debc5ef85a750577ebbae3cf3592c0b3ce
-
SHA256
58c4bea082b2f44f0beab5356ae2bc9bc73c3f13ab0491861bc2ba24690da103
-
SHA512
72ab2ba476428714985da8d51d4a65dee188df05310202b49d7f19645bd316266a9744343d22482d45b7bdd18520395aefb5f5eab16f39633cadac675bbf5695
-
SSDEEP
12288:NCuLlTqCXDuZIqzb3hKRhMLLUVo6huqjp:NCuAn3hK3MLLU1h99
Malware Config
Extracted
trickbot
2000014
mor137
103.127.165.250:449
103.109.78.174:449
199.38.120.89:449
103.206.128.121:449
199.38.120.91:443
199.38.121.150:443
199.38.123.58:443
208.86.162.215:443
208.86.161.113:443
208.86.162.241:443
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
Program crash 1 IoCs
pid pid_target Process procid_target 448 4820 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sfc8b4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3900 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4820 sfc8b4.exe 4820 sfc8b4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3900 4820 sfc8b4.exe 95 PID 4820 wrote to memory of 3900 4820 sfc8b4.exe 95 PID 4820 wrote to memory of 3900 4820 sfc8b4.exe 95 PID 4820 wrote to memory of 3900 4820 sfc8b4.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\sfc8b4.exe"C:\Users\Admin\AppData\Local\Temp\sfc8b4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 6282⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4820 -ip 48201⤵PID:3928