Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/01/2025, 22:38
Behavioral task
behavioral1
Sample
3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24.dll
Resource
win7-20240903-en
General
-
Target
3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24.dll
-
Size
202KB
-
MD5
f78e6aef4f74925687de393667395496
-
SHA1
239f35629a9b9aba485516c5794c77cfdce91905
-
SHA256
3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24
-
SHA512
dfc0c60915ab685cd29fecfadd6144dd8dfb7ce859d264245ea5f6738c885e79bc3d2f74e90dac2541c3332a878530eca0474a8291181c9fa93e3ba89118aa14
-
SSDEEP
3072:KYKsu1WnjLYkFCLtMINbdsMa1AEPM6Us5vd+3XvhNA1xpCBongHx2M/SC7ZKPx:ndu1ICLtMSC12OdK/kppngRiC7ZKJ
Malware Config
Extracted
trickbot
100010
mon36
5.34.180.180:443
64.74.160.228:443
198.46.198.116:443
5.34.180.185:443
107.152.46.188:443
195.123.241.214:443
23.254.224.2:443
107.172.188.113:443
200.52.147.93:443
185.198.59.45:443
45.14.226.101:443
185.82.126.38:443
85.204.116.139:443
45.155.173.248:443
103.91.244.50:443
45.230.244.20:443
45.226.124.226:443
187.84.95.6:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
180.92.158.244:443
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 wermgr.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2256 2252 regsvr32.exe 31 PID 2252 wrote to memory of 2256 2252 regsvr32.exe 31 PID 2252 wrote to memory of 2256 2252 regsvr32.exe 31 PID 2252 wrote to memory of 2256 2252 regsvr32.exe 31 PID 2252 wrote to memory of 2256 2252 regsvr32.exe 31 PID 2252 wrote to memory of 2256 2252 regsvr32.exe 31 PID 2252 wrote to memory of 2256 2252 regsvr32.exe 31 PID 2256 wrote to memory of 2100 2256 regsvr32.exe 32 PID 2256 wrote to memory of 2100 2256 regsvr32.exe 32 PID 2256 wrote to memory of 2100 2256 regsvr32.exe 32 PID 2256 wrote to memory of 2100 2256 regsvr32.exe 32 PID 2256 wrote to memory of 2100 2256 regsvr32.exe 32 PID 2256 wrote to memory of 2100 2256 regsvr32.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-