Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 14:55

General

  • Target

    cfde117b17c27f85169ad02256991c06.exe

  • Size

    4.1MB

  • MD5

    cfde117b17c27f85169ad02256991c06

  • SHA1

    407b79248177f34d215c8ac56dc2e4f6ad2b2c54

  • SHA256

    93da2c13d3708853fd6230ac659a4cbbe26593aa0f335ad3e62b262ac6876e62

  • SHA512

    69d141e37fbf65d21b16cf81a5cac8d71b8ad746fc0c081578e552f004174ee99cfdf45b14511c6909f8b208f2a44176f284653071bb42553f301a9097b7fc54

  • SSDEEP

    98304:LV5gByop3bAU4jgGgnbnB4/7mN/naip6NOrxzfc0Nmm7pFRt:Lu9rEjhCB4jI4Kmm7xt

Malware Config

Signatures

  • ServHelper

    ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies RDP port number used by Windows 1 TTPs
  • Possible privilege escalation attempt 8 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Modifies file permissions 1 TTPs 8 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 8 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfde117b17c27f85169ad02256991c06.exe
    "C:\Users\Admin\AppData\Local\Temp\cfde117b17c27f85169ad02256991c06.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3852
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4860
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m0rqjzvp\m0rqjzvp.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4140
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB40E.tmp" "c:\Users\Admin\AppData\Local\Temp\m0rqjzvp\CSC3635D73791D7439BA8E983E848F82334.TMP"
          4⤵
            PID:1196
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2964
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3244
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4064
        • C:\Windows\SysWOW64\takeown.exe
          "C:\Windows\system32\takeown.exe" /A /F rfxvmt.dll
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:3580
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /inheritance:d
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:1464
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /setowner "NT SERVICE\TrustedInstaller"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:2676
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT AUTHORITY\SYSTEM:RX"
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:2624
        • C:\Windows\SysWOW64\icacls.exe
          "C:\Windows\system32\icacls.exe" rfxvmt.dll /grant BUILTIN\Administrators:RX
          3⤵
          • Possible privilege escalation attempt
          • Modifies file permissions
          PID:2080
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f
          3⤵
            PID:4804
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f
            3⤵
            • Sets DLL path for service in the registry
            • Modifies registry key
            PID:3108
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f
            3⤵
              PID:564
            • C:\Windows\SysWOW64\icacls.exe
              "C:\Windows\system32\icacls.exe" rfxvmt.dll /remove BUILTIN\Administrators
              3⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:3880
            • C:\Windows\SysWOW64\icacls.exe
              "C:\Windows\system32\icacls.exe" rfxvmt.dll /remove "NT AUTHORITY\SYSTEM"
              3⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:2836
            • C:\Windows\SysWOW64\icacls.exe
              "C:\Windows\system32\icacls.exe" rfxvmt.dll /grant "NT SERVICE\TrustedInstaller:F"
              3⤵
              • Possible privilege escalation attempt
              • Modifies file permissions
              PID:4720
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2588
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                4⤵
                  PID:4736
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c cmd /c net start TermService
                3⤵
                  PID:1588
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net start TermService
                    4⤵
                      PID:4344
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4880
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c del %temp%\*.txt /f
                    3⤵
                      PID:4892
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del %temp%\*.ps1 /f
                      3⤵
                        PID:2156
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net start rdpdr
                    1⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3984
                    • C:\Windows\SysWOW64\net.exe
                      net start rdpdr
                      2⤵
                        PID:4540
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start TermService
                      1⤵
                        PID:1664
                      • C:\Windows\SysWOW64\net.exe
                        net start TermService
                        1⤵
                          PID:3720
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start rdpdr
                          1⤵
                            PID:4508

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                            Filesize

                            53KB

                            MD5

                            e2e6bbdcc5cb2b2a8e58e62380cbdeeb

                            SHA1

                            fd3b0bbf8d08573d022e54ceb111e4dfe93ff752

                            SHA256

                            2cf90543f0e785093db02f3ce60471d639ec8e5030a2ea0d70187ce55c248cf2

                            SHA512

                            82ff827ccb3eb01f00713dfcf4d2ef8107c86d206698a366293bb723e36d9a20dba44c818d40e79824fd72c76987e71d69565a3079bccaaa0626d64a13014317

                          • C:\Users\Admin\AppData\Local\Temp\RESB40E.tmp

                            Filesize

                            1KB

                            MD5

                            c84160fe48d9d19c2b2fe1395feeb590

                            SHA1

                            f56e0f6e0de2f157f9aaf868476598f175098a2c

                            SHA256

                            b54272bd130fb34fb8d297f8b8d60acfff4fe54fa0239a7a299e664e6a68b206

                            SHA512

                            130fabae438a824ba3137ad2ebadca0351d09c8ac2cf93414491825ecde8521072d3bdf9a0a1dc776d7f9a162c6feea0ddbcd077fa9cd137e9dd31e82e6e66d6

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qzgrci14.0dq.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\get-dnsprovider.PS1

                            Filesize

                            19KB

                            MD5

                            668825e1e0784fa33f1d8c923b5d4775

                            SHA1

                            070921b376829103441a542f36c3f2f31bd8fa98

                            SHA256

                            38edf9157475baab4a6645876a8344548ca1f5c1fecfff19ffa9730077767d33

                            SHA512

                            c5884af8a548376084d576c77d9d0ec80a7dd50ca75b8851feb37fa08099ca61e039bed8ce10697c074e1d017e411740f632d9a584f0b1f05ebd0c43b00034b4

                          • C:\Users\Admin\AppData\Local\Temp\m0rqjzvp\m0rqjzvp.dll

                            Filesize

                            3KB

                            MD5

                            a4e851147cdcac5338dcd01af26728c5

                            SHA1

                            42a366335d351616d31b1b6798ce97f609852105

                            SHA256

                            5744779d056f79092c726305e0f5c753356c0d24d5d05457c58a0c21e863da98

                            SHA512

                            6d4412a9d9fcb96cf077e204ae67b2923bffb5686c9dbddc424f10a91333618d1e18de258224f329be7c78a1a417da6f80bab2903406d62a16532381d1deb213

                          • C:\Users\Admin\AppData\Local\Temp\ready.ps1

                            Filesize

                            1KB

                            MD5

                            28d9755addec05c0b24cca50dfe3a92b

                            SHA1

                            7d3156f11c7a7fb60d29809caf93101de2681aa3

                            SHA256

                            abb6ceb444b3dc29fcdcb8bda4935a6a792b85bb7049cb2710d97415d9411af9

                            SHA512

                            891a72eeef42be3f04067225a9665020704c99f9c17473ca57e5b946dfa35cb469fa91a794ea30115ce3ed0e940edb3ccff69a16a888379f5ac46a12afaa4c42

                          • C:\Windows\SysWOW64\rfxvmt.dll

                            Filesize

                            40KB

                            MD5

                            dc39d23e4c0e681fad7a3e1342a2843c

                            SHA1

                            58fd7d50c2dca464a128f5e0435d6f0515e62073

                            SHA256

                            6d9a41a03a3bd5362e3af24f97ba99d2f9927d1375e4f608942a712866d133b9

                            SHA512

                            5cb75e04ce9f5c3714e30c4fd5b8dbcd3952c3d756556dd76206111fe5b4e980c6c50209ab0914ab3afe15bd9c33ff0d49463ca11547214122859918de2a58f7

                          • \??\c:\Users\Admin\AppData\Local\Temp\m0rqjzvp\CSC3635D73791D7439BA8E983E848F82334.TMP

                            Filesize

                            652B

                            MD5

                            1859acf181606be9fd47b1e2981699aa

                            SHA1

                            1029efd2d36b9d4cba3fab0c001e8c5cab903572

                            SHA256

                            0c6fa6ceabad80914e070b84c1cb5364f11b9f090fb61f01f105ee98d528ded5

                            SHA512

                            645bd795573235db0a282c78983d576d607d42f811cfbccc5300ca94f04426b0062df2567760eb3ea5772816398b2da2cb82d8e6eed5d37cb5306f18c343a226

                          • \??\c:\Users\Admin\AppData\Local\Temp\m0rqjzvp\m0rqjzvp.0.cs

                            Filesize

                            424B

                            MD5

                            9f8ab7eb0ab21443a2fe06dab341510e

                            SHA1

                            2b88b3116a79e48bab7114e18c9b9674e8a52165

                            SHA256

                            e1a4fbe36125e02e100e729ce92ab74869423da87cb46da6e3c50d7c4410b2d9

                            SHA512

                            53f5dc4c853af5a412fde895635ef4b2de98a165e3546130fdd17a37a5c3b177e21eccf70a5ddf936ac491da2d7e8fcdbc1e564a95ec01b097841aa78869989b

                          • \??\c:\Users\Admin\AppData\Local\Temp\m0rqjzvp\m0rqjzvp.cmdline

                            Filesize

                            369B

                            MD5

                            7843691e3603a9a5d89ce5a220d23ce0

                            SHA1

                            774619d5b85c1c6d506d86917c4dc9e6c8c27648

                            SHA256

                            805761930c4fff15576d4960538f5022d1e7c6e271b95b88a169be25eb2869d4

                            SHA512

                            889774de113e182b6ba8dc014e4f24cfbee647204b5373d997db1a96f2ee5531b812616b793894a5ecb840df4c8d773099a35bcf3d104b7eadb5b2321475019d

                          • memory/2964-93-0x0000000007600000-0x0000000007614000-memory.dmp

                            Filesize

                            80KB

                          • memory/2964-68-0x0000000005560000-0x0000000005570000-memory.dmp

                            Filesize

                            64KB

                          • memory/2964-69-0x0000000005560000-0x0000000005570000-memory.dmp

                            Filesize

                            64KB

                          • memory/2964-92-0x00000000075F0000-0x00000000075FE000-memory.dmp

                            Filesize

                            56KB

                          • memory/2964-91-0x00000000075C0000-0x00000000075D1000-memory.dmp

                            Filesize

                            68KB

                          • memory/2964-90-0x0000000007650000-0x00000000076E6000-memory.dmp

                            Filesize

                            600KB

                          • memory/2964-96-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/2964-89-0x0000000007450000-0x000000000745A000-memory.dmp

                            Filesize

                            40KB

                          • memory/2964-76-0x000000006FD20000-0x000000006FD6C000-memory.dmp

                            Filesize

                            304KB

                          • memory/2964-77-0x000000006FD70000-0x00000000700C4000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/2964-88-0x0000000007290000-0x0000000007333000-memory.dmp

                            Filesize

                            652KB

                          • memory/2964-87-0x0000000007220000-0x000000000723E000-memory.dmp

                            Filesize

                            120KB

                          • memory/2964-75-0x0000000007240000-0x0000000007272000-memory.dmp

                            Filesize

                            200KB

                          • memory/2964-70-0x0000000005560000-0x0000000005570000-memory.dmp

                            Filesize

                            64KB

                          • memory/2964-95-0x0000000007630000-0x0000000007638000-memory.dmp

                            Filesize

                            32KB

                          • memory/2964-60-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/2964-94-0x00000000076F0000-0x000000000770A000-memory.dmp

                            Filesize

                            104KB

                          • memory/3244-112-0x000000006FD20000-0x000000006FD6C000-memory.dmp

                            Filesize

                            304KB

                          • memory/3244-99-0x0000000004A00000-0x0000000004A10000-memory.dmp

                            Filesize

                            64KB

                          • memory/3244-98-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/3244-113-0x000000006FD70000-0x00000000700C4000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/3244-123-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/3244-106-0x0000000004A00000-0x0000000004A10000-memory.dmp

                            Filesize

                            64KB

                          • memory/3852-54-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/3852-3-0x0000000007890000-0x0000000007C94000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/3852-1-0x0000000002990000-0x0000000002D99000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/3852-57-0x0000000007470000-0x0000000007480000-memory.dmp

                            Filesize

                            64KB

                          • memory/3852-2-0x0000000002DA0000-0x00000000031A2000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/3852-4-0x0000000000400000-0x0000000002540000-memory.dmp

                            Filesize

                            33.2MB

                          • memory/3852-5-0x0000000007470000-0x0000000007480000-memory.dmp

                            Filesize

                            64KB

                          • memory/3852-6-0x0000000007C90000-0x0000000008234000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/3852-7-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/3852-8-0x0000000008240000-0x00000000082D2000-memory.dmp

                            Filesize

                            584KB

                          • memory/3852-9-0x0000000007470000-0x0000000007480000-memory.dmp

                            Filesize

                            64KB

                          • memory/3852-10-0x0000000008420000-0x000000000842A000-memory.dmp

                            Filesize

                            40KB

                          • memory/3852-11-0x00000000093E0000-0x0000000009446000-memory.dmp

                            Filesize

                            408KB

                          • memory/3852-15-0x0000000002990000-0x0000000002D99000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/3852-30-0x0000000002DA0000-0x00000000031A2000-memory.dmp

                            Filesize

                            4.0MB

                          • memory/4064-125-0x00000000053B0000-0x00000000053C0000-memory.dmp

                            Filesize

                            64KB

                          • memory/4064-146-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4064-136-0x000000006FD70000-0x00000000700C4000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4064-135-0x000000006FD20000-0x000000006FD6C000-memory.dmp

                            Filesize

                            304KB

                          • memory/4064-124-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4860-31-0x0000000002240000-0x0000000002250000-memory.dmp

                            Filesize

                            64KB

                          • memory/4860-55-0x0000000006E90000-0x0000000006EBC000-memory.dmp

                            Filesize

                            176KB

                          • memory/4860-19-0x0000000004C80000-0x0000000004CA2000-memory.dmp

                            Filesize

                            136KB

                          • memory/4860-32-0x0000000002240000-0x0000000002250000-memory.dmp

                            Filesize

                            64KB

                          • memory/4860-97-0x0000000002240000-0x0000000002250000-memory.dmp

                            Filesize

                            64KB

                          • memory/4860-33-0x00000000057E0000-0x0000000005B34000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4860-34-0x0000000005BD0000-0x0000000005BEE000-memory.dmp

                            Filesize

                            120KB

                          • memory/4860-71-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4860-35-0x0000000005C20000-0x0000000005C6C000-memory.dmp

                            Filesize

                            304KB

                          • memory/4860-38-0x0000000006110000-0x000000000612A000-memory.dmp

                            Filesize

                            104KB

                          • memory/4860-37-0x0000000007230000-0x00000000078AA000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4860-73-0x0000000002240000-0x0000000002250000-memory.dmp

                            Filesize

                            64KB

                          • memory/4860-16-0x0000000002250000-0x0000000002286000-memory.dmp

                            Filesize

                            216KB

                          • memory/4860-17-0x0000000074790000-0x0000000074F40000-memory.dmp

                            Filesize

                            7.7MB

                          • memory/4860-18-0x0000000004CB0000-0x00000000052D8000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/4860-20-0x0000000005450000-0x00000000054B6000-memory.dmp

                            Filesize

                            408KB

                          • memory/4860-74-0x0000000002240000-0x0000000002250000-memory.dmp

                            Filesize

                            64KB

                          • memory/4860-147-0x00000000071D0000-0x00000000071F2000-memory.dmp

                            Filesize

                            136KB

                          • memory/4860-149-0x0000000073260000-0x0000000073272000-memory.dmp

                            Filesize

                            72KB

                          • memory/4860-51-0x0000000006180000-0x0000000006188000-memory.dmp

                            Filesize

                            32KB

                          • memory/4860-162-0x000000006FD20000-0x000000006FD6C000-memory.dmp

                            Filesize

                            304KB