Analysis

  • max time kernel
    129s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    16-10-2021 10:32

General

  • Target

    2e3b62f4f1669b3615608ea31e1796dd.exe

  • Size

    6.7MB

  • MD5

    2e3b62f4f1669b3615608ea31e1796dd

  • SHA1

    9f9584588e480c0cfc18b770da47b00919e24219

  • SHA256

    f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625

  • SHA512

    2879f87ce2e3c075512408fbdb17a01209663c2f635c3e07cec1d8e9b1f0490c9219eea2229dcd5863467435d35bef874e9d5fd243e46b02850d0157288b95af

Malware Config

Signatures

  • ServHelper

    ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Executes dropped EXE 1 IoCs
  • Modifies RDP port number used by Windows 1 TTPs
  • Sets DLL path for service in the registry 2 TTPs
  • Deletes itself 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e3b62f4f1669b3615608ea31e1796dd.exe
    "C:\Users\Admin\AppData\Local\Temp\2e3b62f4f1669b3615608ea31e1796dd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3536
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'
        3⤵
        • Deletes itself
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mcs55g2f\mcs55g2f.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD51E.tmp" "c:\Users\Admin\AppData\Local\Temp\mcs55g2f\CSC27FE41FAA71B45F0B8E9CABA9ADC1DF5.TMP"
            5⤵
              PID:1980
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:624
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:584
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2288
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f
            4⤵
              PID:3412
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f
              4⤵
              • Modifies registry key
              PID:3148
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f
              4⤵
                PID:68
              • C:\Windows\SysWOW64\net.exe
                "C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3684
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                  5⤵
                    PID:2424
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:608
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net start rdpdr
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:204
                    • C:\Windows\SysWOW64\net.exe
                      net start rdpdr
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:184
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start rdpdr
                        7⤵
                          PID:1216
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c cmd /c net start TermService
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1572
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net start TermService
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3756
                      • C:\Windows\SysWOW64\net.exe
                        net start TermService
                        6⤵
                        • Suspicious use of WriteProcessMemory
                        PID:784
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start TermService
                          7⤵
                            PID:2660
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f
                      4⤵
                        PID:3772
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f
                        4⤵
                          PID:1780

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/584-466-0x0000000000F72000-0x0000000000F73000-memory.dmp

                    Filesize

                    4KB

                  • memory/584-465-0x0000000000F70000-0x0000000000F71000-memory.dmp

                    Filesize

                    4KB

                  • memory/584-558-0x000000007F460000-0x000000007F461000-memory.dmp

                    Filesize

                    4KB

                  • memory/624-208-0x00000000070F0000-0x00000000070F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/624-229-0x000000007EAA0000-0x000000007EAA1000-memory.dmp

                    Filesize

                    4KB

                  • memory/624-209-0x00000000070F2000-0x00000000070F3000-memory.dmp

                    Filesize

                    4KB

                  • memory/624-201-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/624-200-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2288-814-0x000000007ED70000-0x000000007ED71000-memory.dmp

                    Filesize

                    4KB

                  • memory/2288-718-0x00000000070B0000-0x00000000070B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2288-719-0x00000000070B2000-0x00000000070B3000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-167-0x0000000009630000-0x0000000009631000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-148-0x0000000003520000-0x0000000003521000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-159-0x0000000008600000-0x0000000008601000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-160-0x00000000088C0000-0x00000000088C1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-157-0x0000000008210000-0x0000000008211000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-162-0x0000000003520000-0x0000000003521000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-166-0x0000000009EF0000-0x0000000009EF1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-158-0x00000000085E0000-0x00000000085E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-1150-0x000000007EF20000-0x000000007EF21000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-156-0x00000000072E2000-0x00000000072E3000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-155-0x00000000072E0000-0x00000000072E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-153-0x0000000007F50000-0x0000000007F51000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-152-0x0000000007850000-0x0000000007851000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-151-0x0000000007920000-0x0000000007921000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-150-0x0000000007170000-0x0000000007171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-175-0x0000000007430000-0x0000000007431000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-149-0x0000000003520000-0x0000000003521000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-189-0x00000000072E3000-0x00000000072E4000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-198-0x00000000099F0000-0x00000000099F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-121-0x0000000006980000-0x0000000006981000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-123-0x0000000007490000-0x0000000007491000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-115-0x0000000000F50000-0x0000000000F51000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-119-0x0000000005F30000-0x0000000005F31000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-120-0x0000000006890000-0x0000000006891000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-117-0x00000000062F0000-0x00000000062F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-122-0x00000000073F0000-0x0000000007411000-memory.dmp

                    Filesize

                    132KB

                  • memory/3132-118-0x0000000005E90000-0x0000000005E91000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-127-0x000000000D4D0000-0x000000000D4D1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-126-0x0000000009400000-0x000000000940B000-memory.dmp

                    Filesize

                    44KB

                  • memory/3132-125-0x0000000006981000-0x0000000006982000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-124-0x0000000007450000-0x0000000007451000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-139-0x0000000005580000-0x0000000005581000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-131-0x0000000000B00000-0x0000000000F0B000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3536-134-0x0000000000B00000-0x0000000000F0B000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3536-136-0x0000000000B00000-0x0000000000B01000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-138-0x00000000059A0000-0x0000000005D9F000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3536-140-0x0000000005582000-0x0000000005583000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-143-0x0000000005E10000-0x0000000005E11000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-145-0x0000000005584000-0x0000000005585000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-144-0x0000000005583000-0x0000000005584000-memory.dmp

                    Filesize

                    4KB