Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2025, 22:38
Behavioral task
behavioral1
Sample
3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24.dll
Resource
win7-20240903-en
General
-
Target
3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24.dll
-
Size
202KB
-
MD5
f78e6aef4f74925687de393667395496
-
SHA1
239f35629a9b9aba485516c5794c77cfdce91905
-
SHA256
3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24
-
SHA512
dfc0c60915ab685cd29fecfadd6144dd8dfb7ce859d264245ea5f6738c885e79bc3d2f74e90dac2541c3332a878530eca0474a8291181c9fa93e3ba89118aa14
-
SSDEEP
3072:KYKsu1WnjLYkFCLtMINbdsMa1AEPM6Us5vd+3XvhNA1xpCBongHx2M/SC7ZKPx:ndu1ICLtMSC12OdK/kppngRiC7ZKJ
Malware Config
Extracted
trickbot
100010
mon36
5.34.180.180:443
64.74.160.228:443
198.46.198.116:443
5.34.180.185:443
107.152.46.188:443
195.123.241.214:443
23.254.224.2:443
107.172.188.113:443
200.52.147.93:443
185.198.59.45:443
45.14.226.101:443
185.82.126.38:443
85.204.116.139:443
45.155.173.248:443
103.91.244.50:443
45.230.244.20:443
45.226.124.226:443
187.84.95.6:443
186.250.157.116:443
186.137.85.76:443
36.94.62.207:443
182.253.107.34:443
180.92.158.244:443
-
autorunName:pwgrab
Signatures
-
Trickbot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 952 wermgr.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2440 wrote to memory of 3316 2440 regsvr32.exe 85 PID 2440 wrote to memory of 3316 2440 regsvr32.exe 85 PID 2440 wrote to memory of 3316 2440 regsvr32.exe 85 PID 3316 wrote to memory of 952 3316 regsvr32.exe 86 PID 3316 wrote to memory of 952 3316 regsvr32.exe 86 PID 3316 wrote to memory of 952 3316 regsvr32.exe 86 PID 3316 wrote to memory of 952 3316 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\3d365a73eaa676b9ea64a5e3f2eb0130ab09ff35087f626f45ae8233aebf4c24.dll2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-