Analysis

  • max time kernel
    169s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    28-01-2022 19:39

General

  • Target

    918de40e8ba7e9c1ba555aa22c8acbfdf77f9c050d5ddcd7bd0e3221195c876f.exe

  • Size

    1.2MB

  • MD5

    e5a23e8a2c0f98850b1a43b595c08e63

  • SHA1

    9136eed34bea473d0f8554fb1d914502b832f219

  • SHA256

    918de40e8ba7e9c1ba555aa22c8acbfdf77f9c050d5ddcd7bd0e3221195c876f

  • SHA512

    cee90fc9c50cec6e41b1c14f1dfb3b25839fbb9f4e09c914343e673216e37f7e93f4a8a8e47cddfe841c4f0f122ba2a4f32bc8d673b9a882d92b0498748d3a6e

Malware Config

Extracted

Family

plugx

C2

www.apple-net.com:80

www.apple-net.com:53

www.apple-net.com:8080

www.apple-net.com:443

Mutex

Attributes
  • folder

    Microsoft Malware ProtectionGCg

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • suricata: ET MALWARE APT Mustang Panda Payload - CnC Checkin

    suricata: ET MALWARE APT Mustang Panda Payload - CnC Checkin

  • suricata: ET MALWARE Possible PlugX Common Header Struct

    suricata: ET MALWARE Possible PlugX Common Header Struct

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\918de40e8ba7e9c1ba555aa22c8acbfdf77f9c050d5ddcd7bd0e3221195c876f.exe
    "C:\Users\Admin\AppData\Local\Temp\918de40e8ba7e9c1ba555aa22c8acbfdf77f9c050d5ddcd7bd0e3221195c876f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\DSR.docx
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\DSR.docx"
        3⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1944
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          4⤵
            PID:1752
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\DSR.exe
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:368
        • C:\Users\Admin\AppData\Local\Temp\DSR.exe
          "C:\Users\Admin\AppData\Local\Temp\DSR.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:536
          • C:\ProgramData\Microsoft Malware ProtectionGCg\unsecapp.exe
            "C:\ProgramData\Microsoft Malware ProtectionGCg\unsecapp.exe" 6
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            PID:628

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/536-68-0x00000000000F0000-0x000000000011F000-memory.dmp

      Filesize

      188KB

    • memory/536-65-0x0000000000520000-0x0000000000587000-memory.dmp

      Filesize

      412KB

    • memory/628-74-0x00000000004A0000-0x0000000000507000-memory.dmp

      Filesize

      412KB

    • memory/628-75-0x00000000001B0000-0x00000000001DF000-memory.dmp

      Filesize

      188KB

    • memory/1712-54-0x0000000075D61000-0x0000000075D63000-memory.dmp

      Filesize

      8KB

    • memory/1752-81-0x000007FEFB711000-0x000007FEFB713000-memory.dmp

      Filesize

      8KB

    • memory/1944-76-0x0000000072061000-0x0000000072064000-memory.dmp

      Filesize

      12KB

    • memory/1944-77-0x000000006FAE1000-0x000000006FAE3000-memory.dmp

      Filesize

      8KB

    • memory/1944-78-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1944-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB