Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2024, 10:27

General

  • Target

    maza54ter.exe

  • Size

    652KB

  • MD5

    06bab8c2471bf909b73801d1cb458678

  • SHA1

    4a75cc936c0875bff1ccc167d2ec698305d12c3e

  • SHA256

    055234a3607c09868727f44eb871614aba6b3b01ac60174501f127ca0be24642

  • SHA512

    80a9d233c72d8d6035d3254c8237acd6b9f0308ddda4b2e4e936c85a22769306744ca60a47bcdc2871fc5da5379ce4bab89e6d33d0259dcd1c1155ec050124e6

  • SSDEEP

    12288:0GrOiraom1pPA1sGPdqdr6NuR4BKbydWwkBnO7WlK:RhaH1pPYdurWuReqh0WU

Malware Config

Extracted

Family

trickbot

Version

100014

Botnet

yas54

C2

68.201.55.46:443

71.42.188.85:443

50.197.243.125:443

70.119.149.64:443

71.66.92.190:443

137.27.148.14:443

156.19.152.218:443

73.103.36.158:443

67.212.241.178:443

65.158.28.70:443

96.88.45.25:443

50.84.233.214:443

73.6.0.166:449

50.75.131.6:443

72.128.158.51:443

104.4.84.130:443

108.161.11.44:443

75.118.158.174:443

67.48.50.58:443

47.51.21.82:443

Attributes
  • autorun
    Name:pwgrab
ecc_pubkey.base64

Signatures

  • Trickbot

    Developed in 2016, TrickBot is one of the more recent banking Trojans.

  • Trickbot family
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\maza54ter.exe
    "C:\Users\Admin\AppData\Local\Temp\maza54ter.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe
      2⤵
        PID:4420
      • C:\Windows\system32\wermgr.exe
        C:\Windows\system32\wermgr.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4324
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 760
        2⤵
        • Program crash
        PID:3264
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 760
        2⤵
        • Program crash
        PID:2472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1804 -ip 1804
      1⤵
        PID:800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1804 -ip 1804
        1⤵
          PID:2832

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1804-3-0x00000000025C0000-0x0000000002601000-memory.dmp

          Filesize

          260KB

        • memory/1804-9-0x0000000002480000-0x00000000024BC000-memory.dmp

          Filesize

          240KB

        • memory/1804-8-0x0000000002400000-0x000000000243E000-memory.dmp

          Filesize

          248KB

        • memory/1804-7-0x0000000002480000-0x00000000024BC000-memory.dmp

          Filesize

          240KB

        • memory/1804-49-0x0000000002480000-0x00000000024BC000-memory.dmp

          Filesize

          240KB

        • memory/1804-47-0x0000000003F60000-0x0000000004043000-memory.dmp

          Filesize

          908KB

        • memory/1804-144-0x0000000010000000-0x0000000010003000-memory.dmp

          Filesize

          12KB

        • memory/1804-143-0x0000000002610000-0x0000000002611000-memory.dmp

          Filesize

          4KB

        • memory/1804-148-0x0000000002480000-0x00000000024BC000-memory.dmp

          Filesize

          240KB

        • memory/4324-145-0x0000026B83D00000-0x0000026B83D29000-memory.dmp

          Filesize

          164KB

        • memory/4324-146-0x0000026B83DE0000-0x0000026B83DE1000-memory.dmp

          Filesize

          4KB

        • memory/4324-149-0x0000026B83D00000-0x0000026B83D29000-memory.dmp

          Filesize

          164KB