Analysis
-
max time kernel
127s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
16-10-2021 09:43
Static task
static1
Behavioral task
behavioral1
Sample
f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe
Resource
win10-en-20211014
General
-
Target
f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe
-
Size
6.7MB
-
MD5
2e3b62f4f1669b3615608ea31e1796dd
-
SHA1
9f9584588e480c0cfc18b770da47b00919e24219
-
SHA256
f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625
-
SHA512
2879f87ce2e3c075512408fbdb17a01209663c2f635c3e07cec1d8e9b1f0490c9219eea2229dcd5863467435d35bef874e9d5fd243e46b02850d0157288b95af
Malware Config
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Executes dropped EXE 1 IoCs
pid Process 3204 InstallUtil.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Deletes itself 1 IoCs
pid Process 964 powershell.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/8-122-0x0000000007310000-0x0000000007331000-memory.dmp agile_net behavioral1/memory/8-125-0x0000000005EB0000-0x00000000063AE000-memory.dmp agile_net -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 8 set thread context of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 680 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 964 powershell.exe 964 powershell.exe 964 powershell.exe 4028 powershell.exe 4028 powershell.exe 4028 powershell.exe 1476 powershell.exe 1476 powershell.exe 1476 powershell.exe 4028 powershell.exe 4028 powershell.exe 4028 powershell.exe 964 powershell.exe 964 powershell.exe 964 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 636 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe Token: SeDebugPrivilege 964 powershell.exe Token: SeDebugPrivilege 4028 powershell.exe Token: SeDebugPrivilege 1476 powershell.exe Token: SeDebugPrivilege 4028 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 PID 8 wrote to memory of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 PID 8 wrote to memory of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 PID 8 wrote to memory of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 PID 8 wrote to memory of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 PID 8 wrote to memory of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 PID 8 wrote to memory of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 PID 8 wrote to memory of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 PID 8 wrote to memory of 3204 8 f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe 69 PID 3204 wrote to memory of 964 3204 InstallUtil.exe 71 PID 3204 wrote to memory of 964 3204 InstallUtil.exe 71 PID 3204 wrote to memory of 964 3204 InstallUtil.exe 71 PID 964 wrote to memory of 1636 964 powershell.exe 73 PID 964 wrote to memory of 1636 964 powershell.exe 73 PID 964 wrote to memory of 1636 964 powershell.exe 73 PID 1636 wrote to memory of 1512 1636 csc.exe 74 PID 1636 wrote to memory of 1512 1636 csc.exe 74 PID 1636 wrote to memory of 1512 1636 csc.exe 74 PID 964 wrote to memory of 4028 964 powershell.exe 75 PID 964 wrote to memory of 4028 964 powershell.exe 75 PID 964 wrote to memory of 4028 964 powershell.exe 75 PID 964 wrote to memory of 1476 964 powershell.exe 77 PID 964 wrote to memory of 1476 964 powershell.exe 77 PID 964 wrote to memory of 1476 964 powershell.exe 77 PID 964 wrote to memory of 4028 964 powershell.exe 79 PID 964 wrote to memory of 4028 964 powershell.exe 79 PID 964 wrote to memory of 4028 964 powershell.exe 79 PID 964 wrote to memory of 1488 964 powershell.exe 83 PID 964 wrote to memory of 1488 964 powershell.exe 83 PID 964 wrote to memory of 1488 964 powershell.exe 83 PID 964 wrote to memory of 680 964 powershell.exe 84 PID 964 wrote to memory of 680 964 powershell.exe 84 PID 964 wrote to memory of 680 964 powershell.exe 84 PID 964 wrote to memory of 1864 964 powershell.exe 85 PID 964 wrote to memory of 1864 964 powershell.exe 85 PID 964 wrote to memory of 1864 964 powershell.exe 85 PID 964 wrote to memory of 2068 964 powershell.exe 86 PID 964 wrote to memory of 2068 964 powershell.exe 86 PID 964 wrote to memory of 2068 964 powershell.exe 86 PID 2068 wrote to memory of 1972 2068 net.exe 87 PID 2068 wrote to memory of 1972 2068 net.exe 87 PID 2068 wrote to memory of 1972 2068 net.exe 87 PID 964 wrote to memory of 2304 964 powershell.exe 88 PID 964 wrote to memory of 2304 964 powershell.exe 88 PID 964 wrote to memory of 2304 964 powershell.exe 88 PID 2304 wrote to memory of 2284 2304 cmd.exe 89 PID 2304 wrote to memory of 2284 2304 cmd.exe 89 PID 2304 wrote to memory of 2284 2304 cmd.exe 89 PID 2284 wrote to memory of 2196 2284 cmd.exe 90 PID 2284 wrote to memory of 2196 2284 cmd.exe 90 PID 2284 wrote to memory of 2196 2284 cmd.exe 90 PID 2196 wrote to memory of 1724 2196 net.exe 91 PID 2196 wrote to memory of 1724 2196 net.exe 91 PID 2196 wrote to memory of 1724 2196 net.exe 91 PID 964 wrote to memory of 1384 964 powershell.exe 92 PID 964 wrote to memory of 1384 964 powershell.exe 92 PID 964 wrote to memory of 1384 964 powershell.exe 92 PID 1384 wrote to memory of 3264 1384 cmd.exe 93 PID 1384 wrote to memory of 3264 1384 cmd.exe 93 PID 1384 wrote to memory of 3264 1384 cmd.exe 93 PID 3264 wrote to memory of 3512 3264 cmd.exe 94 PID 3264 wrote to memory of 3512 3264 cmd.exe 94 PID 3264 wrote to memory of 3512 3264 cmd.exe 94 PID 3512 wrote to memory of 3004 3512 net.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe"C:\Users\Admin\AppData\Local\Temp\f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'3⤵
- Deletes itself
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\swwk0kcn\swwk0kcn.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8A3B.tmp" "c:\Users\Admin\AppData\Local\Temp\swwk0kcn\CSCBA413C0FAB3444CF8999DAC8421F5270.TMP"5⤵PID:1512
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f4⤵PID:1488
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f4⤵
- Modifies registry key
PID:680
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f4⤵PID:1864
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add5⤵PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\net.exenet start rdpdr6⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr7⤵PID:1724
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\net.exenet start TermService6⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService7⤵PID:3004
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f4⤵PID:3776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f4⤵PID:2952
-
-
-