Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
13-10-2021 17:43
Static task
static1
Behavioral task
behavioral1
Sample
44d42138d67d0e52c3c26cb726bc8f39.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
44d42138d67d0e52c3c26cb726bc8f39.exe
Resource
win10-en-20210920
General
-
Target
44d42138d67d0e52c3c26cb726bc8f39.exe
-
Size
4.2MB
-
MD5
44d42138d67d0e52c3c26cb726bc8f39
-
SHA1
2613e0e464b334ed66e34a8cffc174c5603dd1d9
-
SHA256
074d3a0bcfb3d4b0b179a2495004fb95947de60ce002fded7af1d1781add9d2b
-
SHA512
9d59b4dfb96bbe5b59f1b5c0561dafd8fe3f2fb1ababf4e7a384577ddf63adb703802187e7a7bfd671c4fd67e84214bb2b3283edae85e0f2a424148d9e0be1fa
Malware Config
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Drops file in Windows directory 8 IoCs
Processes:
powershell.exedescription ioc Process File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid Process 2224 powershell.exe 2224 powershell.exe 2224 powershell.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 3616 powershell.exe 3616 powershell.exe 3616 powershell.exe 4392 powershell.exe 4392 powershell.exe 4392 powershell.exe 2224 powershell.exe 2224 powershell.exe 2224 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid Process 624 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2224 powershell.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 4392 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
44d42138d67d0e52c3c26cb726bc8f39.exepowershell.execsc.exenet.execmd.execmd.exenet.execmd.execmd.exenet.exedescription pid Process procid_target PID 3572 wrote to memory of 2224 3572 44d42138d67d0e52c3c26cb726bc8f39.exe 72 PID 3572 wrote to memory of 2224 3572 44d42138d67d0e52c3c26cb726bc8f39.exe 72 PID 3572 wrote to memory of 2224 3572 44d42138d67d0e52c3c26cb726bc8f39.exe 72 PID 2224 wrote to memory of 1180 2224 powershell.exe 74 PID 2224 wrote to memory of 1180 2224 powershell.exe 74 PID 2224 wrote to memory of 1180 2224 powershell.exe 74 PID 1180 wrote to memory of 1412 1180 csc.exe 75 PID 1180 wrote to memory of 1412 1180 csc.exe 75 PID 1180 wrote to memory of 1412 1180 csc.exe 75 PID 2224 wrote to memory of 2428 2224 powershell.exe 76 PID 2224 wrote to memory of 2428 2224 powershell.exe 76 PID 2224 wrote to memory of 2428 2224 powershell.exe 76 PID 2224 wrote to memory of 3616 2224 powershell.exe 78 PID 2224 wrote to memory of 3616 2224 powershell.exe 78 PID 2224 wrote to memory of 3616 2224 powershell.exe 78 PID 2224 wrote to memory of 4392 2224 powershell.exe 80 PID 2224 wrote to memory of 4392 2224 powershell.exe 80 PID 2224 wrote to memory of 4392 2224 powershell.exe 80 PID 2224 wrote to memory of 2340 2224 powershell.exe 84 PID 2224 wrote to memory of 2340 2224 powershell.exe 84 PID 2224 wrote to memory of 2340 2224 powershell.exe 84 PID 2224 wrote to memory of 3192 2224 powershell.exe 85 PID 2224 wrote to memory of 3192 2224 powershell.exe 85 PID 2224 wrote to memory of 3192 2224 powershell.exe 85 PID 2224 wrote to memory of 2784 2224 powershell.exe 86 PID 2224 wrote to memory of 2784 2224 powershell.exe 86 PID 2224 wrote to memory of 2784 2224 powershell.exe 86 PID 2224 wrote to memory of 1072 2224 powershell.exe 87 PID 2224 wrote to memory of 1072 2224 powershell.exe 87 PID 2224 wrote to memory of 1072 2224 powershell.exe 87 PID 1072 wrote to memory of 5004 1072 net.exe 88 PID 1072 wrote to memory of 5004 1072 net.exe 88 PID 1072 wrote to memory of 5004 1072 net.exe 88 PID 2224 wrote to memory of 4800 2224 powershell.exe 89 PID 2224 wrote to memory of 4800 2224 powershell.exe 89 PID 2224 wrote to memory of 4800 2224 powershell.exe 89 PID 4800 wrote to memory of 1476 4800 cmd.exe 90 PID 4800 wrote to memory of 1476 4800 cmd.exe 90 PID 4800 wrote to memory of 1476 4800 cmd.exe 90 PID 1476 wrote to memory of 2552 1476 cmd.exe 91 PID 1476 wrote to memory of 2552 1476 cmd.exe 91 PID 1476 wrote to memory of 2552 1476 cmd.exe 91 PID 2552 wrote to memory of 5016 2552 net.exe 92 PID 2552 wrote to memory of 5016 2552 net.exe 92 PID 2552 wrote to memory of 5016 2552 net.exe 92 PID 2224 wrote to memory of 5020 2224 powershell.exe 93 PID 2224 wrote to memory of 5020 2224 powershell.exe 93 PID 2224 wrote to memory of 5020 2224 powershell.exe 93 PID 5020 wrote to memory of 5068 5020 cmd.exe 94 PID 5020 wrote to memory of 5068 5020 cmd.exe 94 PID 5020 wrote to memory of 5068 5020 cmd.exe 94 PID 5068 wrote to memory of 1528 5068 cmd.exe 95 PID 5068 wrote to memory of 1528 5068 cmd.exe 95 PID 5068 wrote to memory of 1528 5068 cmd.exe 95 PID 1528 wrote to memory of 4700 1528 net.exe 96 PID 1528 wrote to memory of 4700 1528 net.exe 96 PID 1528 wrote to memory of 4700 1528 net.exe 96 PID 2224 wrote to memory of 4528 2224 powershell.exe 98 PID 2224 wrote to memory of 4528 2224 powershell.exe 98 PID 2224 wrote to memory of 4528 2224 powershell.exe 98 PID 2224 wrote to memory of 4376 2224 powershell.exe 99 PID 2224 wrote to memory of 4376 2224 powershell.exe 99 PID 2224 wrote to memory of 4376 2224 powershell.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d42138d67d0e52c3c26cb726bc8f39.exe"C:\Users\Admin\AppData\Local\Temp\44d42138d67d0e52c3c26cb726bc8f39.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ebzvxi4p\ebzvxi4p.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES468A.tmp" "c:\Users\Admin\AppData\Local\Temp\ebzvxi4p\CSC107718C646414F85A5263584553A3B5D.TMP"4⤵PID:1412
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:2340
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:3192
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:2784
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:5016
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:4700
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:4528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:4376
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
5f640bd48e2547b4c1a7421f080f815f
SHA1a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a
SHA256916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c
SHA512a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e
-
MD5
f3068198b62b4b70404ec46694d632be
SHA17b0b31ae227cf2a78cb751573a9d07f755104ea0
SHA256bd0fab28319be50795bd6aa9692742ba12539b136036acce2e0403f10a779fc8
SHA512ef285a93898a9436219540f247beb52da69242d05069b3f50d1761bb956ebb8468aeaeadcb87dd7a09f5039c479a31f313c83c4a63c2b2f789f1fe55b4fa9795
-
MD5
fe15a1209ee1751ba8eecb8af3700023
SHA15da2af69eacf26b951bdefdf6d83a2ababb2559c
SHA2566decff2fcd444e83d6e4d4f4ed22dfb3ebb51cc00d086422e01d015804893750
SHA512dbcdaf8231999eb6c11c4f7011d0963904f732271396d09f743c2d42dc6321f05abae754c4a7dfa0e0e233a57be6b8bc32163e200d25aa70008895540433e3cc
-
MD5
eb06d24cf0535d06c878ac9c15bc286d
SHA1d17b9fc0e1c8ebf9046440fb5a5dc661d78e2b08
SHA25679f5b00af174e16734e16ff1cc9730c5f593bff6b6799be153a1590ea606b27f
SHA512d6be48c69fb9b033da5cb3af902ecf3e456c64056d8d5cc0d715b45e25f45a815ea6309d49be0c1b24aea2b24f8dd4ba051b409f8806b778b095c52cef90278d
-
MD5
794bf0ae26a7efb0c516cf4a7692c501
SHA1c8f81d0ddd4d360dcbe0814a04a86748f99c6ff2
SHA25697753653d52aaa961e4d1364b5b43551c76da9bb19e12f741bd67c986259e825
SHA51220c97972a1256375157f82a859ce4936613fe109d54c63bbec25734edc3a567ca976b342a21ef5f25571b3c1959afe618ad9f9f17a817cfd731d1504541b1a75
-
MD5
28d9755addec05c0b24cca50dfe3a92b
SHA17d3156f11c7a7fb60d29809caf93101de2681aa3
SHA256abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9
SHA512891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42
-
MD5
21f772a0c0de7759e18a01a05550ab12
SHA13f76f5c7ea715b458b235be3969b304be3f7f736
SHA25654da60d59998ae312f66793212c2ecc27de0f660369b03604e32cc23f273bd0b
SHA5120c7343505eac67fa1def7bda5b1d0c9cbaed05e2d1807fb5cdb578265a18c042370636a4f4675375c33b8cbfeb1aad1a4edac1069bda2adf866515ab8b8fb3e8
-
MD5
9f8ab7eb0ab21443a2fe06dab341510e
SHA12b88b3116a79e48bab7114e18c9b9674e8a52165
SHA256e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9
SHA51253f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b
-
MD5
961f7a08d667a2adc7c9bc628a1d2286
SHA14af7960cbc47af458d3450c8de09f11dda752da1
SHA25669f70efe6e6ab19d8ef45c55f636d9b5242293ff547924c5716086fb790b47d0
SHA5129158bea41757d60cc7d3f079263af4b78e1de66154223d2970815e6393aedd8a4071c464e6e6e2f4c76bccc6ccfd5c9334df3559ed1ddb16fa057fffbc98e1a6