Resubmissions

05-12-2022 19:46

221205-ygyhfsdd5s 7

18-03-2022 13:00

220318-p8sxlshfg2 10

Analysis

  • max time kernel
    215s
  • max time network
    268s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    18-03-2022 13:00

General

  • Target

    software_reporter_tool.exe

  • Size

    13.9MB

  • MD5

    3dcd45838971b3e51d01e62c09d36e08

  • SHA1

    9884fc2f1ed03043d5a6aa5f59625b7a0cad4c2a

  • SHA256

    d7081c02c19718ed94ef3154ede0d045c50ba7d9e7653b7b5c589ac1a0b36f81

  • SHA512

    6e2b5e3b75bd872bd01c6b8feaea76aea733f75320e4b88877ef1aae061d37ac0de82943502c2c575f67dcd77961bba506d5f16489bd33b8aa621e472fe648fa

Score
10/10

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • PlugX Rat Payload 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\software_reporter_tool.exe
    "C:\Users\Admin\AppData\Local\Temp\software_reporter_tool.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1556
    • \??\c:\users\admin\appdata\local\temp\software_reporter_tool.exe
      c:\users\admin\appdata\local\temp\software_reporter_tool.exe --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=99.279.200 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff69f6325a0,0x7ff69f6325b0,0x7ff69f6325c0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1660
    • \??\c:\users\admin\appdata\local\temp\software_reporter_tool.exe
      "c:\users\admin\appdata\local\temp\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_1556_ENZIMXYSNHWAENXD" --sandboxed-process-id=2 --init-done-notifier=776 --sandbox-mojo-pipe-token=5279705736548596164 --mojo-platform-channel-handle=728 --engine=2
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:2376
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2376 -s 920
        3⤵
        • Program crash
        PID:3248
    • \??\c:\users\admin\appdata\local\temp\software_reporter_tool.exe
      "c:\users\admin\appdata\local\temp\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_1556_ENZIMXYSNHWAENXD" --sandboxed-process-id=3 --init-done-notifier=996 --sandbox-mojo-pipe-token=3211349759538745348 --mojo-platform-channel-handle=992
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3768
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 456 -p 2376 -ip 2376
    1⤵
      PID:2872

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Google\Software Reporter Tool\software_reporter_tool-sandbox.log

      MD5

      86b4f1ab5b3a7f81e4bb5c09a4dcb41b

      SHA1

      b6aca8760cfff6bddc255d1ff6015d51c382d75d

      SHA256

      e81b20645a2d93a0d0c6a98ee4d3ffede164597c2c77d5a250a6159aa20d3146

      SHA512

      fdcbf7d74d3926168b1f5538f27596e8ac140bfe272b081dcec584e77ad132702ecc96334a3c122999357c97c9cba2c0aefcb6a2b7f4e7cbed694b52722a688a

    • C:\Users\Admin\AppData\Local\Temp\edls_64.dll

      MD5

      e9a7c44d7bda10b5b7a132d46fcdaf35

      SHA1

      5217179f094c45ba660777cfa25c7eb00b5c8202

      SHA256

      35351366369a7774f9f30f38dc8aa3cd5e087acd8eae79e80c24526cd40e95a1

      SHA512

      e76308eee65bf0bf31e58d754e07b63092a4109ef3d44df7b746da99d44be6112bc5f970123c4e82523b6d301392e09c2cfc490e304550b42d152cdb0757e774

    • C:\Users\Admin\AppData\Local\Temp\em000_64.dll

      MD5

      d0cf72186dbaea05c5a5bf6594225fc3

      SHA1

      0e69efd78dc1124122dd8b752be92cb1cbc067a1

      SHA256

      225d4f7e3ab4687f05f817435b883f6c3271b6c4d4018d94fe4398a350d74907

      SHA512

      8122a9a9205cfa67ff87cb4755089e5ed1acf8f807467216c98f09f94704f98497f7aa57ad29e255efa4d7206c577c4cf7fed140afb046499fc2e57e03f55285

    • C:\Users\Admin\AppData\Local\Temp\em001_64.dll

      MD5

      7adcb76ec34d774d1435b477e8625c47

      SHA1

      ec4ba0ad028c45489608c6822f3cabb683a07064

      SHA256

      a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d

      SHA512

      c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4

    • C:\Users\Admin\AppData\Local\Temp\em002_64.dll

      MD5

      5913dc18fc2a5dd49ba064655ac75c24

      SHA1

      d941ea7f6a7aa6c8b7dbc65fa37b6bf41dcd9069

      SHA256

      090b958bd2806e2571198847fad60ba446282b783d2da44efe3a879d0507701f

      SHA512

      d71edd1d2a5fa643f22fe0947c5910cf6b796845f6a782dd8503907babce49055175010296fbd890ff9ce0b3dd5df7ebfe7b8fb079c0ae4b7e562099d6e84197

    • C:\Users\Admin\AppData\Local\Temp\em003_64.dll

      MD5

      ced50723c5ae960adfd3fc726b34cdb1

      SHA1

      962a477d168b786b3d1a301793ab91e1a850f376

      SHA256

      5a9dc132339862cc79f38c1b17db4c0fafa58eec396608ac1583784f1b3b6532

      SHA512

      ad70cac1f0a65362f4c2d1c221564c23fc2beecc9842aeb513a1448f2820d987e014af0557a30d50ae136d0bea83b8254ba871937576d3097fce567add578bee

    • C:\Users\Admin\AppData\Local\Temp\em004_64.dll

      MD5

      6e1f355a54cf57047647beb9f5aca079

      SHA1

      529f42911634143507f28d4ea0b6757d6f17af65

      SHA256

      10a6c06788b110c0bfd26603d1dc4e3aec48ba917d4d80dac9fb34f83808eee6

      SHA512

      5ca0bbd9d2337c2e0019969725e904c1ab829dde36d4b35235cc6175d86996dabd2542914d7be0378ed298b758c9e542e059107db8ab7e3de424ac48b8d3aa74

    • C:\Users\Admin\AppData\Local\Temp\em005_64.dll

      MD5

      169a2ef320119891cf3189aa3fd23b0e

      SHA1

      de51c936101ef79bbc0f1d3c800cf832d221eef8

      SHA256

      1072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780

      SHA512

      7fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca

    • \??\c:\users\admin\appdata\local\Google\Software Reporter Tool\settings.dat

      MD5

      0a9f016d5d8859ef687564c70e001f2c

      SHA1

      9c5852c3249012a3597049d2ee1ecd37c94e4bed

      SHA256

      56c6778e96358013bede57018127a9eaaa01dff596b14d3069448b6ef2d64a23

      SHA512

      d751828e01c6933e64044e7ef1bb32829deec5a9f72bd44cab0798d98439e2c72a2ac1720656f088f8a0b4eb8e5389caef531658f5fa16de21e30493e3e134c1

    • \??\c:\users\admin\appdata\local\Google\Software Reporter Tool\settings.dat

      MD5

      0a9f016d5d8859ef687564c70e001f2c

      SHA1

      9c5852c3249012a3597049d2ee1ecd37c94e4bed

      SHA256

      56c6778e96358013bede57018127a9eaaa01dff596b14d3069448b6ef2d64a23

      SHA512

      d751828e01c6933e64044e7ef1bb32829deec5a9f72bd44cab0798d98439e2c72a2ac1720656f088f8a0b4eb8e5389caef531658f5fa16de21e30493e3e134c1

    • \??\c:\users\admin\appdata\local\Google\Software Reporter Tool\settings.dat

      MD5

      0a9f016d5d8859ef687564c70e001f2c

      SHA1

      9c5852c3249012a3597049d2ee1ecd37c94e4bed

      SHA256

      56c6778e96358013bede57018127a9eaaa01dff596b14d3069448b6ef2d64a23

      SHA512

      d751828e01c6933e64044e7ef1bb32829deec5a9f72bd44cab0798d98439e2c72a2ac1720656f088f8a0b4eb8e5389caef531658f5fa16de21e30493e3e134c1

    • \??\c:\users\admin\appdata\local\temp\edls_64.dll

      MD5

      e9a7c44d7bda10b5b7a132d46fcdaf35

      SHA1

      5217179f094c45ba660777cfa25c7eb00b5c8202

      SHA256

      35351366369a7774f9f30f38dc8aa3cd5e087acd8eae79e80c24526cd40e95a1

      SHA512

      e76308eee65bf0bf31e58d754e07b63092a4109ef3d44df7b746da99d44be6112bc5f970123c4e82523b6d301392e09c2cfc490e304550b42d152cdb0757e774

    • \??\c:\users\admin\appdata\local\temp\em000_64.dll

      MD5

      d0cf72186dbaea05c5a5bf6594225fc3

      SHA1

      0e69efd78dc1124122dd8b752be92cb1cbc067a1

      SHA256

      225d4f7e3ab4687f05f817435b883f6c3271b6c4d4018d94fe4398a350d74907

      SHA512

      8122a9a9205cfa67ff87cb4755089e5ed1acf8f807467216c98f09f94704f98497f7aa57ad29e255efa4d7206c577c4cf7fed140afb046499fc2e57e03f55285

    • \??\c:\users\admin\appdata\local\temp\em001_64.dll

      MD5

      7adcb76ec34d774d1435b477e8625c47

      SHA1

      ec4ba0ad028c45489608c6822f3cabb683a07064

      SHA256

      a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d

      SHA512

      c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4

    • \??\c:\users\admin\appdata\local\temp\em002_64.dll

      MD5

      5913dc18fc2a5dd49ba064655ac75c24

      SHA1

      d941ea7f6a7aa6c8b7dbc65fa37b6bf41dcd9069

      SHA256

      090b958bd2806e2571198847fad60ba446282b783d2da44efe3a879d0507701f

      SHA512

      d71edd1d2a5fa643f22fe0947c5910cf6b796845f6a782dd8503907babce49055175010296fbd890ff9ce0b3dd5df7ebfe7b8fb079c0ae4b7e562099d6e84197

    • \??\c:\users\admin\appdata\local\temp\em003_64.dll

      MD5

      ced50723c5ae960adfd3fc726b34cdb1

      SHA1

      962a477d168b786b3d1a301793ab91e1a850f376

      SHA256

      5a9dc132339862cc79f38c1b17db4c0fafa58eec396608ac1583784f1b3b6532

      SHA512

      ad70cac1f0a65362f4c2d1c221564c23fc2beecc9842aeb513a1448f2820d987e014af0557a30d50ae136d0bea83b8254ba871937576d3097fce567add578bee

    • \??\c:\users\admin\appdata\local\temp\em004_64.dll

      MD5

      6e1f355a54cf57047647beb9f5aca079

      SHA1

      529f42911634143507f28d4ea0b6757d6f17af65

      SHA256

      10a6c06788b110c0bfd26603d1dc4e3aec48ba917d4d80dac9fb34f83808eee6

      SHA512

      5ca0bbd9d2337c2e0019969725e904c1ab829dde36d4b35235cc6175d86996dabd2542914d7be0378ed298b758c9e542e059107db8ab7e3de424ac48b8d3aa74

    • \??\c:\users\admin\appdata\local\temp\em005_64.dll

      MD5

      169a2ef320119891cf3189aa3fd23b0e

      SHA1

      de51c936101ef79bbc0f1d3c800cf832d221eef8

      SHA256

      1072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780

      SHA512

      7fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca

    • \??\pipe\crashpad_1556_ENZIMXYSNHWAENXD

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • memory/2376-132-0x00007FF955970000-0x00007FF955971000-memory.dmp

      Filesize

      4KB

    • memory/2376-133-0x00007FF955D50000-0x00007FF955D51000-memory.dmp

      Filesize

      4KB

    • memory/2376-155-0x00000249B07B0000-0x00000249B07B1000-memory.dmp

      Filesize

      4KB

    • memory/2376-156-0x00000249B06F0000-0x00000249B06F1000-memory.dmp

      Filesize

      4KB