Analysis

  • max time kernel
    136s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2024, 10:27

General

  • Target

    maza54ter.exe

  • Size

    652KB

  • MD5

    06bab8c2471bf909b73801d1cb458678

  • SHA1

    4a75cc936c0875bff1ccc167d2ec698305d12c3e

  • SHA256

    055234a3607c09868727f44eb871614aba6b3b01ac60174501f127ca0be24642

  • SHA512

    80a9d233c72d8d6035d3254c8237acd6b9f0308ddda4b2e4e936c85a22769306744ca60a47bcdc2871fc5da5379ce4bab89e6d33d0259dcd1c1155ec050124e6

  • SSDEEP

    12288:0GrOiraom1pPA1sGPdqdr6NuR4BKbydWwkBnO7WlK:RhaH1pPYdurWuReqh0WU

Malware Config

Extracted

Family

trickbot

Version

100014

Botnet

yas54

C2

68.201.55.46:443

71.42.188.85:443

50.197.243.125:443

70.119.149.64:443

71.66.92.190:443

137.27.148.14:443

156.19.152.218:443

73.103.36.158:443

67.212.241.178:443

65.158.28.70:443

96.88.45.25:443

50.84.233.214:443

73.6.0.166:449

50.75.131.6:443

72.128.158.51:443

104.4.84.130:443

108.161.11.44:443

75.118.158.174:443

67.48.50.58:443

47.51.21.82:443

Attributes
  • autorun
    Name:pwgrab
ecc_pubkey.base64

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\maza54ter.exe
    "C:\Users\Admin\AppData\Local\Temp\maza54ter.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe
      2⤵
        PID:2072
      • C:\Windows\system32\wermgr.exe
        C:\Windows\system32\wermgr.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2056-179-0x0000000010000000-0x0000000010003000-memory.dmp

      Filesize

      12KB

    • memory/2056-3-0x0000000001E80000-0x0000000001EC1000-memory.dmp

      Filesize

      260KB

    • memory/2056-7-0x0000000001FE0000-0x000000000201C000-memory.dmp

      Filesize

      240KB

    • memory/2056-10-0x0000000003180000-0x00000000032DC000-memory.dmp

      Filesize

      1.4MB

    • memory/2056-9-0x0000000001FE0000-0x000000000201C000-memory.dmp

      Filesize

      240KB

    • memory/2056-41-0x0000000001FE0000-0x000000000201C000-memory.dmp

      Filesize

      240KB

    • memory/2056-8-0x00000000002E0000-0x000000000031E000-memory.dmp

      Filesize

      248KB

    • memory/2056-178-0x0000000000330000-0x0000000000331000-memory.dmp

      Filesize

      4KB

    • memory/2056-182-0x0000000010000000-0x0000000010003000-memory.dmp

      Filesize

      12KB

    • memory/2056-184-0x0000000001FE0000-0x000000000201C000-memory.dmp

      Filesize

      240KB

    • memory/2156-180-0x0000000000060000-0x0000000000089000-memory.dmp

      Filesize

      164KB

    • memory/2156-181-0x00000000000A0000-0x00000000000A1000-memory.dmp

      Filesize

      4KB

    • memory/2156-183-0x0000000000060000-0x0000000000089000-memory.dmp

      Filesize

      164KB