Analysis

  • max time kernel
    129s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    16-10-2021 10:32

General

  • Target

    2e3b62f4f1669b3615608ea31e1796dd.exe

  • Size

    6.7MB

  • MD5

    2e3b62f4f1669b3615608ea31e1796dd

  • SHA1

    9f9584588e480c0cfc18b770da47b00919e24219

  • SHA256

    f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625

  • SHA512

    2879f87ce2e3c075512408fbdb17a01209663c2f635c3e07cec1d8e9b1f0490c9219eea2229dcd5863467435d35bef874e9d5fd243e46b02850d0157288b95af

Malware Config

Signatures

  • ServHelper

    ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Executes dropped EXE 1 IoCs
  • Modifies RDP port number used by Windows 1 TTPs
  • Sets DLL path for service in the registry 2 TTPs
  • Deletes itself 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e3b62f4f1669b3615608ea31e1796dd.exe
    "C:\Users\Admin\AppData\Local\Temp\2e3b62f4f1669b3615608ea31e1796dd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3536
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'
        3⤵
        • Deletes itself
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mcs55g2f\mcs55g2f.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD51E.tmp" "c:\Users\Admin\AppData\Local\Temp\mcs55g2f\CSC27FE41FAA71B45F0B8E9CABA9ADC1DF5.TMP"
            5⤵
              PID:1980
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:624
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:584
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2288
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f
            4⤵
              PID:3412
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f
              4⤵
              • Modifies registry key
              PID:3148
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f
              4⤵
                PID:68
              • C:\Windows\SysWOW64\net.exe
                "C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3684
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                  5⤵
                    PID:2424
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:608
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net start rdpdr
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:204
                    • C:\Windows\SysWOW64\net.exe
                      net start rdpdr
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:184
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start rdpdr
                        7⤵
                          PID:1216
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c cmd /c net start TermService
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1572
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net start TermService
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3756
                      • C:\Windows\SysWOW64\net.exe
                        net start TermService
                        6⤵
                        • Suspicious use of WriteProcessMemory
                        PID:784
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start TermService
                          7⤵
                            PID:2660
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f
                      4⤵
                        PID:3772
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f
                        4⤵
                          PID:1780

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                    MD5

                    f3068198b62b4b70404ec46694d632be

                    SHA1

                    7b0b31ae227cf2a78cb751573a9d07f755104ea0

                    SHA256

                    bd0fab28319be50795bd6aa9692742ba12539b136036acce2e0403f10a779fc8

                    SHA512

                    ef285a93898a9436219540f247beb52da69242d05069b3f50d1761bb956ebb8468aeaeadcb87dd7a09f5039c479a31f313c83c4a63c2b2f789f1fe55b4fa9795

                  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe

                    MD5

                    91c9ae9c9a17a9db5e08b120e668c74c

                    SHA1

                    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

                    SHA256

                    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

                    SHA512

                    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

                  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe

                    MD5

                    91c9ae9c9a17a9db5e08b120e668c74c

                    SHA1

                    50770954c1ceb0bb6f1d5d3f2de2a0a065773723

                    SHA256

                    e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f

                    SHA512

                    ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e

                  • C:\Users\Admin\AppData\Local\Temp\RESD51E.tmp

                    MD5

                    a7998c77bce14e39c510665ec4bae5f3

                    SHA1

                    6d7aa8dd6bd817b5a7f8d4136958a52daa2cab21

                    SHA256

                    58b9ba9fa3e851dcf67bdf99538d47645571d9119d04ea5ba916200f60156635

                    SHA512

                    07b3e2b6e10e4dcccb39d5a73dc1a2163510bd25517beb5884e0860536305c8ef8f2b89571ad88c729b40c0533644baf56cf7f9ec862b761c12842e33e5c4511

                  • C:\Users\Admin\AppData\Local\Temp\get-dnsprovider.PS1

                    MD5

                    841cc93778b4ec353d0075d717b90df4

                    SHA1

                    287f652b7be199d127aab4655055654a6ea2bed6

                    SHA256

                    77f2e15c057346682081eae41389c9d91ba710c2f91107a9c59543c71cf6cad1

                    SHA512

                    a98053ebe4279d8b312a27f634ca2a9b4d929e15f8d27bdb2e89706a9fa967035e58a5d5cec2be0e5ea763b8c278884863f91d8ca270d4a30a20c51d00b72541

                  • C:\Users\Admin\AppData\Local\Temp\mcs55g2f\mcs55g2f.dll

                    MD5

                    5bbfb7cb113926b2e41d03198c136cd5

                    SHA1

                    d9670f03b972a0428c71fb85d2813e23b5af4380

                    SHA256

                    dc248ebf5657126cc342d55dcc3adb3b5e264c959a850d4d4c3759ced993a831

                    SHA512

                    2c2abf7eb461ed25793f6faca92661c5ac21d24989d673e11a3401649af8b7a7b6eaaebcc242329ff80c362228db9ae18dc30ded41763b5bdc0e4628136d7ec8

                  • C:\Users\Admin\AppData\Local\Temp\ready.ps1

                    MD5

                    28d9755addec05c0b24cca50dfe3a92b

                    SHA1

                    7d3156f11c7a7fb60d29809caf93101de2681aa3

                    SHA256

                    abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9

                    SHA512

                    891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42

                  • \??\c:\Users\Admin\AppData\Local\Temp\mcs55g2f\CSC27FE41FAA71B45F0B8E9CABA9ADC1DF5.TMP

                    MD5

                    f24bae077f80473b7064dadaff8c572b

                    SHA1

                    9a07f1487ff2f2f4d6830ff68401b11edfaa5135

                    SHA256

                    f5965a5ed8d31dab586e3e80005f5d0e7cb9f7740af8a7536f3e5f7bf98c33fb

                    SHA512

                    5c3db391bfe9acf6759e05181760fbca1c3c3703f6029095616ba4af1fd331c6fbf966a03cf1919179d379ab54e8f5c6f01c436a76fc10e2c1814d6000a68d59

                  • \??\c:\Users\Admin\AppData\Local\Temp\mcs55g2f\mcs55g2f.0.cs

                    MD5

                    9f8ab7eb0ab21443a2fe06dab341510e

                    SHA1

                    2b88b3116a79e48bab7114e18c9b9674e8a52165

                    SHA256

                    e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9

                    SHA512

                    53f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b

                  • \??\c:\Users\Admin\AppData\Local\Temp\mcs55g2f\mcs55g2f.cmdline

                    MD5

                    39cbc7c9ca11d01c0bf5f8d288ba9517

                    SHA1

                    ccf93d56da3970e53f43e13ee34a38120666cc9e

                    SHA256

                    82a04debbcd2f3f5a6bc68ce17a4b059e401a4e9eb4726b5ea0fafe4ff660c63

                    SHA512

                    cb20f43096a35285654278023bd263b36c6e8177e83351dc5a9af96cbd7903f76180aaa1e316524809f8ed18357c5b6983aab827f67fb1b9fadc5efb303ac496

                  • memory/68-986-0x0000000000000000-mapping.dmp

                  • memory/184-1029-0x0000000000000000-mapping.dmp

                  • memory/204-1028-0x0000000000000000-mapping.dmp

                  • memory/584-466-0x0000000000F72000-0x0000000000F73000-memory.dmp

                    Filesize

                    4KB

                  • memory/584-465-0x0000000000F70000-0x0000000000F71000-memory.dmp

                    Filesize

                    4KB

                  • memory/584-558-0x000000007F460000-0x000000007F461000-memory.dmp

                    Filesize

                    4KB

                  • memory/584-454-0x0000000000000000-mapping.dmp

                  • memory/608-1027-0x0000000000000000-mapping.dmp

                  • memory/624-208-0x00000000070F0000-0x00000000070F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/624-199-0x0000000000000000-mapping.dmp

                  • memory/624-229-0x000000007EAA0000-0x000000007EAA1000-memory.dmp

                    Filesize

                    4KB

                  • memory/624-209-0x00000000070F2000-0x00000000070F3000-memory.dmp

                    Filesize

                    4KB

                  • memory/624-201-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/624-200-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                    Filesize

                    4KB

                  • memory/784-1033-0x0000000000000000-mapping.dmp

                  • memory/1216-1030-0x0000000000000000-mapping.dmp

                  • memory/1572-1031-0x0000000000000000-mapping.dmp

                  • memory/1780-1050-0x0000000000000000-mapping.dmp

                  • memory/1980-171-0x0000000000000000-mapping.dmp

                  • memory/2288-814-0x000000007ED70000-0x000000007ED71000-memory.dmp

                    Filesize

                    4KB

                  • memory/2288-718-0x00000000070B0000-0x00000000070B1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2288-719-0x00000000070B2000-0x00000000070B3000-memory.dmp

                    Filesize

                    4KB

                  • memory/2288-705-0x0000000000000000-mapping.dmp

                  • memory/2344-167-0x0000000009630000-0x0000000009631000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-148-0x0000000003520000-0x0000000003521000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-159-0x0000000008600000-0x0000000008601000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-160-0x00000000088C0000-0x00000000088C1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-157-0x0000000008210000-0x0000000008211000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-162-0x0000000003520000-0x0000000003521000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-166-0x0000000009EF0000-0x0000000009EF1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-158-0x00000000085E0000-0x00000000085E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-1150-0x000000007EF20000-0x000000007EF21000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-156-0x00000000072E2000-0x00000000072E3000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-155-0x00000000072E0000-0x00000000072E1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-153-0x0000000007F50000-0x0000000007F51000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-152-0x0000000007850000-0x0000000007851000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-151-0x0000000007920000-0x0000000007921000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-150-0x0000000007170000-0x0000000007171000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-175-0x0000000007430000-0x0000000007431000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-149-0x0000000003520000-0x0000000003521000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-189-0x00000000072E3000-0x00000000072E4000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-198-0x00000000099F0000-0x00000000099F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2344-147-0x0000000000000000-mapping.dmp

                  • memory/2424-1024-0x0000000000000000-mapping.dmp

                  • memory/2576-168-0x0000000000000000-mapping.dmp

                  • memory/2660-1034-0x0000000000000000-mapping.dmp

                  • memory/3132-121-0x0000000006980000-0x0000000006981000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-123-0x0000000007490000-0x0000000007491000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-115-0x0000000000F50000-0x0000000000F51000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-119-0x0000000005F30000-0x0000000005F31000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-120-0x0000000006890000-0x0000000006891000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-117-0x00000000062F0000-0x00000000062F1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-122-0x00000000073F0000-0x0000000007411000-memory.dmp

                    Filesize

                    132KB

                  • memory/3132-118-0x0000000005E90000-0x0000000005E91000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-127-0x000000000D4D0000-0x000000000D4D1000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-126-0x0000000009400000-0x000000000940B000-memory.dmp

                    Filesize

                    44KB

                  • memory/3132-125-0x0000000006981000-0x0000000006982000-memory.dmp

                    Filesize

                    4KB

                  • memory/3132-124-0x0000000007450000-0x0000000007451000-memory.dmp

                    Filesize

                    4KB

                  • memory/3148-985-0x0000000000000000-mapping.dmp

                  • memory/3412-984-0x0000000000000000-mapping.dmp

                  • memory/3536-139-0x0000000005580000-0x0000000005581000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-129-0x000000000040330C-mapping.dmp

                  • memory/3536-131-0x0000000000B00000-0x0000000000F0B000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3536-134-0x0000000000B00000-0x0000000000F0B000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3536-136-0x0000000000B00000-0x0000000000B01000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-138-0x00000000059A0000-0x0000000005D9F000-memory.dmp

                    Filesize

                    4.0MB

                  • memory/3536-140-0x0000000005582000-0x0000000005583000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-143-0x0000000005E10000-0x0000000005E11000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-145-0x0000000005584000-0x0000000005585000-memory.dmp

                    Filesize

                    4KB

                  • memory/3536-144-0x0000000005583000-0x0000000005584000-memory.dmp

                    Filesize

                    4KB

                  • memory/3684-1023-0x0000000000000000-mapping.dmp

                  • memory/3756-1032-0x0000000000000000-mapping.dmp

                  • memory/3772-1049-0x0000000000000000-mapping.dmp