Resubmissions

05-12-2022 19:46

221205-ygyhfsdd5s 7

18-03-2022 13:00

220318-p8sxlshfg2 10

Analysis

  • max time kernel
    4294295s
  • max time network
    242s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    18-03-2022 13:00

General

  • Target

    software_reporter_tool.exe

  • Size

    13.9MB

  • MD5

    3dcd45838971b3e51d01e62c09d36e08

  • SHA1

    9884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a

  • SHA256

    d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81

  • SHA512

    6e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa

Score
10/10

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • PlugX Rat Payload 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\software_reporter_tool.exe
    "C:\Users\Admin\AppData\Local\Temp\software_reporter_tool.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1712
    • \??\c:\users\admin\appdata\local\temp\software_reporter_tool.exe
      c:\users\admin\appdata\local\temp\software_reporter_tool.exe --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=99.279.200 --initial-client-data=0x160,0x164,0x168,0x134,0x16c,0x13ff725a0,0x13ff725b0,0x13ff725c0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:308
    • \??\c:\users\admin\appdata\local\temp\software_reporter_tool.exe
      "c:\users\admin\appdata\local\temp\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_1712_YEUCCDVMTFECGAPF" --sandboxed-process-id=2 --init-done-notifier=484 --sandbox-mojo-pipe-token=4170110093468989769 --mojo-platform-channel-handle=452 --engine=2
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1948
    • \??\c:\users\admin\appdata\local\temp\software_reporter_tool.exe
      "c:\users\admin\appdata\local\temp\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_1712_YEUCCDVMTFECGAPF" --sandboxed-process-id=3 --init-done-notifier=636 --sandbox-mojo-pipe-token=17242315781746750151 --mojo-platform-channel-handle=632
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Google\Software Reporter Tool\software_reporter_tool-sandbox.log

    MD5

    f9273abe5caab0fee451ca2538502810

    SHA1

    244d660e2af609f9635cfba976a44cf51f7b748d

    SHA256

    3615a528cc8505b740ef6bef6ac292802835bdc07d84fae06c73dd5b79181575

    SHA512

    e6cb775b78f7483cdcd038a330fcb9824d8c8b9a6b8b2ad1f49ab4acd2ebdfecd0ca6404e0ff6f3598f85c12893ef3a8f4978e16144b2ea118eef1cfd4234048

  • \??\c:\users\admin\appdata\local\Google\Software Reporter Tool\settings.dat

    MD5

    61406e3812bdb5e38bb8afed254b2b7a

    SHA1

    9aa1f735f48e02685e86ba5185d08115c74775d5

    SHA256

    ec8f3751a576242a603005c20465d8d45eeb78bc5848e44b35777b045e5c01d4

    SHA512

    0f40ec9d80fd3f93f1eb3bf1ff9a1035ac9411f4eb3c4c95f315f8719ee0a4cf66ba46590f7bccaed93f32f76aa43f104d592552d19699fdc5cdcdb2d1b64ae7

  • \??\c:\users\admin\appdata\local\Google\Software Reporter Tool\settings.dat

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \??\c:\users\admin\appdata\local\Google\Software Reporter Tool\settings.dat

    MD5

    61406e3812bdb5e38bb8afed254b2b7a

    SHA1

    9aa1f735f48e02685e86ba5185d08115c74775d5

    SHA256

    ec8f3751a576242a603005c20465d8d45eeb78bc5848e44b35777b045e5c01d4

    SHA512

    0f40ec9d80fd3f93f1eb3bf1ff9a1035ac9411f4eb3c4c95f315f8719ee0a4cf66ba46590f7bccaed93f32f76aa43f104d592552d19699fdc5cdcdb2d1b64ae7

  • \??\c:\users\admin\appdata\local\temp\edls_64.dll

    MD5

    e9a7c44d7bda10b5b7a132d46fcdaf35

    SHA1

    5217179f094c45ba660777cfa25c7eb00b5c8202

    SHA256

    35351366369a7774f9f30f38dc8aa3cd5e087acd8eae79e80c24526cd40e95a1

    SHA512

    e76308eee65bf0bf31e58d754e07b63092a4109ef3d44df7b746da99d44be6112bc5f970123c4e82523b6d301392e09c2cfc490e304550b42d152cdb0757e774

  • \??\c:\users\admin\appdata\local\temp\em000_64.dll

    MD5

    d0cf72186dbaea05c5a5bf6594225fc3

    SHA1

    0e69efd78dc1124122dd8b752be92cb1cbc067a1

    SHA256

    225d4f7e3ab4687f05f817435b883f6c3271b6c4d4018d94fe4398a350d74907

    SHA512

    8122a9a9205cfa67ff87cb4755089e5ed1acf8f807467216c98f09f94704f98497f7aa57ad29e255efa4d7206c577c4cf7fed140afb046499fc2e57e03f55285

  • \??\c:\users\admin\appdata\local\temp\em001_64.dll

    MD5

    7adcb76ec34d774d1435b477e8625c47

    SHA1

    ec4ba0ad028c45489608c6822f3cabb683a07064

    SHA256

    a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d

    SHA512

    c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4

  • \??\c:\users\admin\appdata\local\temp\em002_64.dll

    MD5

    5913dc18fc2a5dd49ba064655ac75c24

    SHA1

    d941ea7f6a7aa6c8b7dbc65fa37b6bf41dcd9069

    SHA256

    090b958bd2806e2571198847fad60ba446282b783d2da44efe3a879d0507701f

    SHA512

    d71edd1d2a5fa643f22fe0947c5910cf6b796845f6a782dd8503907babce49055175010296fbd890ff9ce0b3dd5df7ebfe7b8fb079c0ae4b7e562099d6e84197

  • \??\c:\users\admin\appdata\local\temp\em003_64.dll

    MD5

    ced50723c5ae960adfd3fc726b34cdb1

    SHA1

    962a477d168b786b3d1a301793ab91e1a850f376

    SHA256

    5a9dc132339862cc79f38c1b17db4c0fafa58eec396608ac1583784f1b3b6532

    SHA512

    ad70cac1f0a65362f4c2d1c221564c23fc2beecc9842aeb513a1448f2820d987e014af0557a30d50ae136d0bea83b8254ba871937576d3097fce567add578bee

  • \??\c:\users\admin\appdata\local\temp\em004_64.dll

    MD5

    6e1f355a54cf57047647beb9f5aca079

    SHA1

    529f42911634143507f28d4ea0b6757d6f17af65

    SHA256

    10a6c06788b110c0bfd26603d1dc4e3aec48ba917d4d80dac9fb34f83808eee6

    SHA512

    5ca0bbd9d2337c2e0019969725e904c1ab829dde36d4b35235cc6175d86996dabd2542914d7be0378ed298b758c9e542e059107db8ab7e3de424ac48b8d3aa74

  • \??\c:\users\admin\appdata\local\temp\em005_64.dll

    MD5

    169a2ef320119891cf3189aa3fd23b0e

    SHA1

    de51c936101ef79bbc0f1d3c800cf832d221eef8

    SHA256

    1072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780

    SHA512

    7fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca

  • \??\pipe\crashpad_1712_YEUCCDVMTFECGAPF

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • \Users\Admin\AppData\Local\Temp\edls_64.dll

    MD5

    e9a7c44d7bda10b5b7a132d46fcdaf35

    SHA1

    5217179f094c45ba660777cfa25c7eb00b5c8202

    SHA256

    35351366369a7774f9f30f38dc8aa3cd5e087acd8eae79e80c24526cd40e95a1

    SHA512

    e76308eee65bf0bf31e58d754e07b63092a4109ef3d44df7b746da99d44be6112bc5f970123c4e82523b6d301392e09c2cfc490e304550b42d152cdb0757e774

  • \Users\Admin\AppData\Local\Temp\em000_64.dll

    MD5

    d0cf72186dbaea05c5a5bf6594225fc3

    SHA1

    0e69efd78dc1124122dd8b752be92cb1cbc067a1

    SHA256

    225d4f7e3ab4687f05f817435b883f6c3271b6c4d4018d94fe4398a350d74907

    SHA512

    8122a9a9205cfa67ff87cb4755089e5ed1acf8f807467216c98f09f94704f98497f7aa57ad29e255efa4d7206c577c4cf7fed140afb046499fc2e57e03f55285

  • \Users\Admin\AppData\Local\Temp\em001_64.dll

    MD5

    7adcb76ec34d774d1435b477e8625c47

    SHA1

    ec4ba0ad028c45489608c6822f3cabb683a07064

    SHA256

    a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d

    SHA512

    c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4

  • \Users\Admin\AppData\Local\Temp\em002_64.dll

    MD5

    5913dc18fc2a5dd49ba064655ac75c24

    SHA1

    d941ea7f6a7aa6c8b7dbc65fa37b6bf41dcd9069

    SHA256

    090b958bd2806e2571198847fad60ba446282b783d2da44efe3a879d0507701f

    SHA512

    d71edd1d2a5fa643f22fe0947c5910cf6b796845f6a782dd8503907babce49055175010296fbd890ff9ce0b3dd5df7ebfe7b8fb079c0ae4b7e562099d6e84197

  • \Users\Admin\AppData\Local\Temp\em003_64.dll

    MD5

    ced50723c5ae960adfd3fc726b34cdb1

    SHA1

    962a477d168b786b3d1a301793ab91e1a850f376

    SHA256

    5a9dc132339862cc79f38c1b17db4c0fafa58eec396608ac1583784f1b3b6532

    SHA512

    ad70cac1f0a65362f4c2d1c221564c23fc2beecc9842aeb513a1448f2820d987e014af0557a30d50ae136d0bea83b8254ba871937576d3097fce567add578bee

  • \Users\Admin\AppData\Local\Temp\em004_64.dll

    MD5

    6e1f355a54cf57047647beb9f5aca079

    SHA1

    529f42911634143507f28d4ea0b6757d6f17af65

    SHA256

    10a6c06788b110c0bfd26603d1dc4e3aec48ba917d4d80dac9fb34f83808eee6

    SHA512

    5ca0bbd9d2337c2e0019969725e904c1ab829dde36d4b35235cc6175d86996dabd2542914d7be0378ed298b758c9e542e059107db8ab7e3de424ac48b8d3aa74

  • \Users\Admin\AppData\Local\Temp\em005_64.dll

    MD5

    169a2ef320119891cf3189aa3fd23b0e

    SHA1

    de51c936101ef79bbc0f1d3c800cf832d221eef8

    SHA256

    1072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780

    SHA512

    7fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca

  • memory/1668-107-0x000000013FF77000-0x000000013FF78000-memory.dmp

    Filesize

    4KB

  • memory/1668-109-0x000000013FF77000-0x000000013FF78000-memory.dmp

    Filesize

    4KB

  • memory/1948-72-0x000000013FF77000-0x000000013FF78000-memory.dmp

    Filesize

    4KB

  • memory/1948-74-0x000000013FF77000-0x000000013FF78000-memory.dmp

    Filesize

    4KB

  • memory/1948-115-0x00000000005D0000-0x0000000000610000-memory.dmp

    Filesize

    256KB

  • memory/1948-116-0x00000000005D0000-0x0000000000610000-memory.dmp

    Filesize

    256KB