Analysis
-
max time kernel
116s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-09-2021 15:03
Static task
static1
Behavioral task
behavioral1
Sample
748b112881047820f530c202bb59488e.exe
Resource
win7-en-20210920
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
748b112881047820f530c202bb59488e.exe
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
748b112881047820f530c202bb59488e.exe
-
Size
4.0MB
-
MD5
748b112881047820f530c202bb59488e
-
SHA1
edf77f969bf54a47b21e6179cbcabb4651706d7c
-
SHA256
82285ac0988c68f9b9ecc7649cb9c6a3f3ecb242dd198465dbd4236d7fa6a59c
-
SHA512
252640d935ce3c7885fa48496b1b9c405f5dc9e719eda9c965d5fec46f877c00a7d96b14acf7410fbef9dbbfa9723932b54cdc75084fdd54e492eaa8d6f37ad6
Score
10/10
Malware Config
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3248 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe 3628 powershell.exe 3628 powershell.exe 3628 powershell.exe 512 powershell.exe 512 powershell.exe 512 powershell.exe 3952 powershell.exe 3952 powershell.exe 3952 powershell.exe 2612 powershell.exe 2612 powershell.exe 2612 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 624 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 512 powershell.exe Token: SeDebugPrivilege 3952 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2612 2412 748b112881047820f530c202bb59488e.exe 71 PID 2412 wrote to memory of 2612 2412 748b112881047820f530c202bb59488e.exe 71 PID 2412 wrote to memory of 2612 2412 748b112881047820f530c202bb59488e.exe 71 PID 2612 wrote to memory of 4056 2612 powershell.exe 73 PID 2612 wrote to memory of 4056 2612 powershell.exe 73 PID 2612 wrote to memory of 4056 2612 powershell.exe 73 PID 4056 wrote to memory of 2912 4056 csc.exe 74 PID 4056 wrote to memory of 2912 4056 csc.exe 74 PID 4056 wrote to memory of 2912 4056 csc.exe 74 PID 2612 wrote to memory of 3628 2612 powershell.exe 75 PID 2612 wrote to memory of 3628 2612 powershell.exe 75 PID 2612 wrote to memory of 3628 2612 powershell.exe 75 PID 2612 wrote to memory of 512 2612 powershell.exe 77 PID 2612 wrote to memory of 512 2612 powershell.exe 77 PID 2612 wrote to memory of 512 2612 powershell.exe 77 PID 2612 wrote to memory of 3952 2612 powershell.exe 79 PID 2612 wrote to memory of 3952 2612 powershell.exe 79 PID 2612 wrote to memory of 3952 2612 powershell.exe 79 PID 2612 wrote to memory of 640 2612 powershell.exe 81 PID 2612 wrote to memory of 640 2612 powershell.exe 81 PID 2612 wrote to memory of 640 2612 powershell.exe 81 PID 2612 wrote to memory of 3248 2612 powershell.exe 82 PID 2612 wrote to memory of 3248 2612 powershell.exe 82 PID 2612 wrote to memory of 3248 2612 powershell.exe 82 PID 2612 wrote to memory of 1340 2612 powershell.exe 83 PID 2612 wrote to memory of 1340 2612 powershell.exe 83 PID 2612 wrote to memory of 1340 2612 powershell.exe 83 PID 2612 wrote to memory of 1676 2612 powershell.exe 84 PID 2612 wrote to memory of 1676 2612 powershell.exe 84 PID 2612 wrote to memory of 1676 2612 powershell.exe 84 PID 1676 wrote to memory of 1796 1676 net.exe 85 PID 1676 wrote to memory of 1796 1676 net.exe 85 PID 1676 wrote to memory of 1796 1676 net.exe 85 PID 2612 wrote to memory of 2588 2612 powershell.exe 86 PID 2612 wrote to memory of 2588 2612 powershell.exe 86 PID 2612 wrote to memory of 2588 2612 powershell.exe 86 PID 2588 wrote to memory of 3856 2588 cmd.exe 87 PID 2588 wrote to memory of 3856 2588 cmd.exe 87 PID 2588 wrote to memory of 3856 2588 cmd.exe 87 PID 3856 wrote to memory of 2636 3856 cmd.exe 88 PID 3856 wrote to memory of 2636 3856 cmd.exe 88 PID 3856 wrote to memory of 2636 3856 cmd.exe 88 PID 2636 wrote to memory of 3052 2636 net.exe 89 PID 2636 wrote to memory of 3052 2636 net.exe 89 PID 2636 wrote to memory of 3052 2636 net.exe 89 PID 2612 wrote to memory of 2864 2612 powershell.exe 90 PID 2612 wrote to memory of 2864 2612 powershell.exe 90 PID 2612 wrote to memory of 2864 2612 powershell.exe 90 PID 2864 wrote to memory of 3836 2864 cmd.exe 91 PID 2864 wrote to memory of 3836 2864 cmd.exe 91 PID 2864 wrote to memory of 3836 2864 cmd.exe 91 PID 3836 wrote to memory of 3840 3836 cmd.exe 92 PID 3836 wrote to memory of 3840 3836 cmd.exe 92 PID 3836 wrote to memory of 3840 3836 cmd.exe 92 PID 3840 wrote to memory of 3296 3840 net.exe 93 PID 3840 wrote to memory of 3296 3840 net.exe 93 PID 3840 wrote to memory of 3296 3840 net.exe 93 PID 2612 wrote to memory of 916 2612 powershell.exe 95 PID 2612 wrote to memory of 916 2612 powershell.exe 95 PID 2612 wrote to memory of 916 2612 powershell.exe 95 PID 2612 wrote to memory of 1312 2612 powershell.exe 96 PID 2612 wrote to memory of 1312 2612 powershell.exe 96 PID 2612 wrote to memory of 1312 2612 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\748b112881047820f530c202bb59488e.exe"C:\Users\Admin\AppData\Local\Temp\748b112881047820f530c202bb59488e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wgsr5gx1\wgsr5gx1.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB2CB.tmp" "c:\Users\Admin\AppData\Local\Temp\wgsr5gx1\CSC25A62393E6D843C397C3F863D8835D3E.TMP"4⤵PID:2912
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:640
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:3248
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1340
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:1796
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:3052
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:3296
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:916
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:1312
-
-