Analysis

  • max time kernel
    149s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    15-06-2021 10:44

General

  • Target

    05ed376b3de1d54ac4af50d10b1f08c1.exe

  • Size

    875KB

  • MD5

    05ed376b3de1d54ac4af50d10b1f08c1

  • SHA1

    def26ad3020710b39b79b97f4684d9e057c97b1c

  • SHA256

    6e992161f236fbafbb836065a819195d69af9ba7544ab71542111ac2b3ea8664

  • SHA512

    77afad95dd792ee83230bc8a9ec59285de882d9b19d3608da126e715505d4895b1c79ce10e1a553f175bc18e4dbad001b6e015d559cd601a1f50b450fd8aa19b

Score
10/10

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 29 IoCs
  • Modifies registry class 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:464
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:872
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k SystemNetworkService
        2⤵
        • Drops file in System32 directory
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Modifies registry class
        PID:1608
    • C:\Users\Admin\AppData\Local\Temp\05ed376b3de1d54ac4af50d10b1f08c1.exe
      "C:\Users\Admin\AppData\Local\Temp\05ed376b3de1d54ac4af50d10b1f08c1.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\SysWOW64\rUNdlL32.eXe
        "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",init
        2⤵
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1156

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/872-71-0x0000000001010000-0x000000000105B000-memory.dmp

      Filesize

      300KB

    • memory/872-72-0x00000000026E0000-0x0000000002751000-memory.dmp

      Filesize

      452KB

    • memory/1072-59-0x00000000752F1000-0x00000000752F3000-memory.dmp

      Filesize

      8KB

    • memory/1156-70-0x0000000000720000-0x000000000077C000-memory.dmp

      Filesize

      368KB

    • memory/1156-69-0x0000000001F20000-0x0000000002021000-memory.dmp

      Filesize

      1.0MB

    • memory/1608-74-0x0000000000340000-0x00000000003B1000-memory.dmp

      Filesize

      452KB

    • memory/1608-75-0x0000000002750000-0x0000000002856000-memory.dmp

      Filesize

      1.0MB

    • memory/1608-76-0x0000000001C20000-0x0000000001C3A000-memory.dmp

      Filesize

      104KB