Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 02:48
Static task
static1
Behavioral task
behavioral1
Sample
sample5.exe
Resource
win7-20240903-en
General
-
Target
sample5.exe
-
Size
540KB
-
MD5
c83cea5d71ff20bbe02bfebe8aa27ad3
-
SHA1
388b0a6c1c246e991c2cf090de20108029182bfc
-
SHA256
8a1a2c412148f855d3ae6c32e0f1efead871c4dfae920f121acc3ce5529b451e
-
SHA512
1b46ec494b030dfa378eab86564698f5aff0df1325c3753fb80e5ef1bfad908bd29817f37753b8c5e42d1dca2c549351f60d73e3570c698666645e9acd540998
-
SSDEEP
12288:OrQ0n1IYaHUBzy7JJI7vJ0GKjp5VCU/U+hdNt:RM1IYaHI8JJuvuGWp9lhp
Malware Config
Extracted
trickbot
1000512
ono51
95.171.16.42:443
185.90.61.9:443
5.1.81.68:443
185.99.2.65:443
134.119.191.11:443
85.204.116.100:443
78.108.216.47:443
51.81.112.144:443
194.5.250.121:443
185.14.31.104:443
185.99.2.66:443
107.175.72.141:443
192.3.247.123:443
134.119.191.21:443
85.204.116.216:443
91.235.129.20:443
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
110.93.15.98:449
80.210.32.67:449
103.111.83.246:449
200.107.35.154:449
36.89.182.225:449
36.89.243.241:449
36.92.19.205:449
110.50.84.5:449
182.253.113.67:449
36.66.218.117:449
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample5.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2624 wermgr.exe Token: SeDebugPrivilege 2624 wermgr.exe Token: SeDebugPrivilege 2624 wermgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1852 wrote to memory of 2624 1852 sample5.exe 29 PID 1852 wrote to memory of 2624 1852 sample5.exe 29 PID 1852 wrote to memory of 2624 1852 sample5.exe 29 PID 1852 wrote to memory of 2624 1852 sample5.exe 29 PID 1852 wrote to memory of 2624 1852 sample5.exe 29 PID 1852 wrote to memory of 2624 1852 sample5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample5.exe"C:\Users\Admin\AppData\Local\Temp\sample5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2624
-