Analysis

  • max time kernel
    4294178s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    19-03-2022 12:34

General

  • Target

    bb0ecdccb3372022bdf71f0d75c76eb7ad8309a40ea1ef424ce6fdc5b71aba36.exe

  • Size

    24.0MB

  • MD5

    320aa03413b0e294938db1deccfc314e

  • SHA1

    14c2a2915801555144bf0664e1d90bde6f5cd8c0

  • SHA256

    bb0ecdccb3372022bdf71f0d75c76eb7ad8309a40ea1ef424ce6fdc5b71aba36

  • SHA512

    e7c3362b4ac71db417658ca2fe801fab49b108fff34343e46883ebef5f401990a6adca95b608e9ed75a6ae83d165eaa0602bb174392f6c894d943cf633ec3de5

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • PlugX Rat Payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb0ecdccb3372022bdf71f0d75c76eb7ad8309a40ea1ef424ce6fdc5b71aba36.exe
    "C:\Users\Admin\AppData\Local\Temp\bb0ecdccb3372022bdf71f0d75c76eb7ad8309a40ea1ef424ce6fdc5b71aba36.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/892-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

    Filesize

    8KB

  • memory/892-55-0x0000000075A40000-0x0000000075B50000-memory.dmp

    Filesize

    1.1MB

  • memory/892-56-0x0000000077300000-0x0000000077480000-memory.dmp

    Filesize

    1.5MB

  • memory/892-57-0x0000000076D30000-0x0000000076D77000-memory.dmp

    Filesize

    284KB

  • memory/892-61-0x0000000000C70000-0x0000000002900000-memory.dmp

    Filesize

    28.6MB

  • memory/892-62-0x0000000074390000-0x0000000074A7E000-memory.dmp

    Filesize

    6.9MB

  • memory/892-63-0x0000000006720000-0x0000000006721000-memory.dmp

    Filesize

    4KB

  • memory/892-64-0x000000000BC20000-0x000000000CFEA000-memory.dmp

    Filesize

    19.8MB

  • memory/892-65-0x0000000006D50000-0x0000000008262000-memory.dmp

    Filesize

    21.1MB

  • memory/892-66-0x0000000008260000-0x0000000008878000-memory.dmp

    Filesize

    6.1MB

  • memory/892-67-0x0000000000730000-0x000000000073C000-memory.dmp

    Filesize

    48KB

  • memory/892-68-0x0000000011FF0000-0x000000001269C000-memory.dmp

    Filesize

    6.7MB

  • memory/892-69-0x00000000040D0000-0x0000000004136000-memory.dmp

    Filesize

    408KB

  • memory/892-70-0x0000000006725000-0x0000000006736000-memory.dmp

    Filesize

    68KB