Resubmissions

04-09-2021 07:37

210904-jf39zshben 10

04-09-2021 07:35

210904-jeq82aeab3 10

Analysis

  • max time kernel
    359s
  • max time network
    1275s
  • platform
    windows11_x64
  • resource
    win11
  • submitted
    04-09-2021 07:35

General

  • Target

    svchost.bin.exe

  • Size

    6.6MB

  • MD5

    2787bb2d1ab223f8ac2692f3a8fd85fc

  • SHA1

    dc34ee4e46ddea333cdc90e4aad7589cb8ee1ea0

  • SHA256

    952e3e059251cd41e3c67006c5aa4b75fe3e6b0f18d96554b2d60d4ccfb78cb4

  • SHA512

    d79bd7599ccb09fa72b939a506d04e28cb958e59c3987ab4d375e76337d5b1e33369d59397338aaeaf938c14ec9d93b20501d5224d151631c69c874d0657e9f3

Score
10/10

Malware Config

Signatures

  • Beapy

    Beapy is a python worm with crypto mining capabilities.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 29 IoCs
  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 58 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3364
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4388
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3532
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4528
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4540
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:5044
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:908
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4944
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:968
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:8
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ipconfig /all
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4648
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /all
              4⤵
              • Gathers network information
              PID:2928
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /all
            3⤵
            • Gathers network information
            PID:4720
          • C:\Windows\SysWOW64\netstat.exe
            netstat -na
            3⤵
            • Gathers network information
            • Suspicious use of AdjustPrivilegeToken
            PID:4188
      • C:\Windows\System32\sihclient.exe
        C:\Windows\System32\sihclient.exe /cv bIwyp2o330q1fggh9KFnew.0.2
        1⤵
        • Modifies data under HKEY_USERS
        PID:3732
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
        1⤵
        • Modifies data under HKEY_USERS
        PID:3744
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
        1⤵
          PID:5036
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x4 /state0:0xa3a68055 /state1:0x41c64e6d
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:2272

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/8-223-0x0000026EEBCF6000-0x0000026EEBCF8000-memory.dmp

          Filesize

          8KB

        • memory/8-222-0x0000026EEBCF3000-0x0000026EEBCF5000-memory.dmp

          Filesize

          8KB

        • memory/8-236-0x0000026EEBCF8000-0x0000026EEBCFA000-memory.dmp

          Filesize

          8KB

        • memory/8-233-0x0000026EEC030000-0x0000026EEC031000-memory.dmp

          Filesize

          4KB

        • memory/8-230-0x0000026EECFE0000-0x0000026EECFE1000-memory.dmp

          Filesize

          4KB

        • memory/8-225-0x0000026EEBCA0000-0x0000026EEBCA1000-memory.dmp

          Filesize

          4KB

        • memory/8-221-0x0000026EEBCF0000-0x0000026EEBCF2000-memory.dmp

          Filesize

          8KB

        • memory/8-218-0x0000026EEBD00000-0x0000026EEBD01000-memory.dmp

          Filesize

          4KB

        • memory/8-217-0x0000026EEBC70000-0x0000026EEBC71000-memory.dmp

          Filesize

          4KB

        • memory/8-216-0x0000026EEC330000-0x0000026EEC331000-memory.dmp

          Filesize

          4KB

        • memory/8-215-0x0000026ED3580000-0x0000026ED3581000-memory.dmp

          Filesize

          4KB

        • memory/3364-173-0x0000000002FB0000-0x000000000302C000-memory.dmp

          Filesize

          496KB

        • memory/3364-197-0x0000000003040000-0x0000000003050000-memory.dmp

          Filesize

          64KB

        • memory/3364-163-0x0000000002EF0000-0x0000000002FA5000-memory.dmp

          Filesize

          724KB

        • memory/3364-201-0x0000000003050000-0x0000000003065000-memory.dmp

          Filesize

          84KB

        • memory/3364-159-0x0000000002801000-0x0000000002806000-memory.dmp

          Filesize

          20KB

        • memory/3364-184-0x0000000002820000-0x0000000002830000-memory.dmp

          Filesize

          64KB

        • memory/3744-248-0x000002194D790000-0x000002194D794000-memory.dmp

          Filesize

          16KB

        • memory/3744-250-0x000002194D4D0000-0x000002194D4D4000-memory.dmp

          Filesize

          16KB

        • memory/3744-253-0x000002194B1A0000-0x000002194B1A1000-memory.dmp

          Filesize

          4KB

        • memory/3744-252-0x000002194D4C0000-0x000002194D4C4000-memory.dmp

          Filesize

          16KB

        • memory/3744-245-0x000002194AE60000-0x000002194AE70000-memory.dmp

          Filesize

          64KB

        • memory/3744-246-0x000002194AEE0000-0x000002194AEF0000-memory.dmp

          Filesize

          64KB

        • memory/3744-251-0x000002194D4C0000-0x000002194D4C1000-memory.dmp

          Filesize

          4KB

        • memory/3744-249-0x000002194D750000-0x000002194D751000-memory.dmp

          Filesize

          4KB