Resubmissions

04-09-2021 07:37

210904-jf39zshben 10

04-09-2021 07:35

210904-jeq82aeab3 10

Analysis

  • max time kernel
    1602s
  • max time network
    1758s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    04-09-2021 07:35

General

  • Target

    svchost.bin.exe

  • Size

    6.6MB

  • MD5

    2787bb2d1ab223f8ac2692f3a8fd85fc

  • SHA1

    dc34ee4e46ddea333cdc90e4aad7589cb8ee1ea0

  • SHA256

    952e3e059251cd41e3c67006c5aa4b75fe3e6b0f18d96554b2d60d4ccfb78cb4

  • SHA512

    d79bd7599ccb09fa72b939a506d04e28cb958e59c3987ab4d375e76337d5b1e33369d59397338aaeaf938c14ec9d93b20501d5224d151631c69c874d0657e9f3

Score
10/10

Malware Config

Signatures

  • Beapy

    Beapy is a python worm with crypto mining capabilities.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Loads dropped DLL 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3492
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c wmic ntdomain get domainname
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic ntdomain get domainname
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4428
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net localgroup administrators
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4608
        • C:\Windows\SysWOW64\net.exe
          net localgroup administrators
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4612
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 localgroup administrators
            5⤵
              PID:4604
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net group "domain admins" /domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Windows\SysWOW64\net.exe
            net group "domain admins" /domain
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4144
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 group "domain admins" /domain
              5⤵
                PID:528
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:832
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 832 -s 1932
              4⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2212
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ipconfig /all
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1320
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /all
              4⤵
              • Gathers network information
              PID:3800
          • C:\Windows\SysWOW64\ipconfig.exe
            ipconfig /all
            3⤵
            • Gathers network information
            PID:2752
          • C:\Windows\SysWOW64\netstat.exe
            netstat -na
            3⤵
            • Gathers network information
            • Suspicious use of AdjustPrivilegeToken
            PID:3172

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/832-192-0x000002976EA80000-0x000002976EA81000-memory.dmp

        Filesize

        4KB

      • memory/832-201-0x000002976AA16000-0x000002976AA18000-memory.dmp

        Filesize

        8KB

      • memory/832-195-0x000002976AA13000-0x000002976AA15000-memory.dmp

        Filesize

        8KB

      • memory/832-194-0x000002976AA10000-0x000002976AA12000-memory.dmp

        Filesize

        8KB

      • memory/832-187-0x000002976E8D0000-0x000002976E8D1000-memory.dmp

        Filesize

        4KB

      • memory/3492-144-0x0000000002AC0000-0x0000000002B3C000-memory.dmp

        Filesize

        496KB

      • memory/3492-172-0x0000000002B40000-0x0000000002B55000-memory.dmp

        Filesize

        84KB

      • memory/3492-155-0x0000000001060000-0x0000000001070000-memory.dmp

        Filesize

        64KB

      • memory/3492-128-0x0000000001041000-0x0000000001046000-memory.dmp

        Filesize

        20KB

      • memory/3492-168-0x00000000011A0000-0x00000000011B0000-memory.dmp

        Filesize

        64KB

      • memory/3492-132-0x0000000003340000-0x00000000033F5000-memory.dmp

        Filesize

        724KB