Analysis
-
max time kernel
4294128s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
29-03-2022 08:17
Static task
static1
Behavioral task
behavioral1
Sample
8bd9d.exe
Resource
win7-20220311-en
General
-
Target
8bd9d.exe
-
Size
133KB
-
MD5
99ee1e21a34b0536b120d4a6977fd252
-
SHA1
24c50b507febd6e2b81154d3d80401dd9207e3e1
-
SHA256
8bd9dfcfd59b0e2073caf8c0fc8740a01f8c7eabb6239a9b714d3b41a3793b95
-
SHA512
03cafd628d19cda98db021fb009500105906617ab414c9ba6087c693cacdb36159d1973d21af2b275da136dbb10157f97c243ca1ae7ea198ae99d74427e26408
Malware Config
Signatures
-
PlugX Rat Payload 5 IoCs
resource yara_rule behavioral1/memory/1956-66-0x00000000003C0000-0x00000000003EE000-memory.dmp PlugX behavioral1/memory/536-80-0x00000000002C0000-0x00000000002EE000-memory.dmp PlugX behavioral1/memory/580-81-0x0000000000210000-0x000000000023E000-memory.dmp PlugX behavioral1/memory/632-82-0x00000000003D0000-0x00000000003FE000-memory.dmp PlugX behavioral1/memory/1180-91-0x0000000000810000-0x000000000083E000-memory.dmp PlugX -
Executes dropped EXE 1 IoCs
pid Process 536 vcredist_x64.exe -
Deletes itself 1 IoCs
pid Process 580 svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\~MHZ svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST 8bd9d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 45004100430032004500460043004400310033003400340031004400370039000000 8bd9d.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 536 vcredist_x64.exe 632 svchost.exe 1180 msiexec.exe 1180 msiexec.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1956 8bd9d.exe Token: SeTcbPrivilege 1956 8bd9d.exe Token: SeDebugPrivilege 580 svchost.exe Token: SeTcbPrivilege 580 svchost.exe Token: SeDebugPrivilege 536 vcredist_x64.exe Token: SeTcbPrivilege 536 vcredist_x64.exe Token: SeDebugPrivilege 632 svchost.exe Token: SeTcbPrivilege 632 svchost.exe Token: SeDebugPrivilege 1180 msiexec.exe Token: SeTcbPrivilege 1180 msiexec.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1956 wrote to memory of 580 1956 8bd9d.exe 27 PID 1956 wrote to memory of 580 1956 8bd9d.exe 27 PID 1956 wrote to memory of 580 1956 8bd9d.exe 27 PID 1956 wrote to memory of 580 1956 8bd9d.exe 27 PID 1956 wrote to memory of 580 1956 8bd9d.exe 27 PID 1956 wrote to memory of 580 1956 8bd9d.exe 27 PID 1956 wrote to memory of 580 1956 8bd9d.exe 27 PID 1956 wrote to memory of 580 1956 8bd9d.exe 27 PID 1956 wrote to memory of 580 1956 8bd9d.exe 27 PID 536 wrote to memory of 632 536 vcredist_x64.exe 29 PID 536 wrote to memory of 632 536 vcredist_x64.exe 29 PID 536 wrote to memory of 632 536 vcredist_x64.exe 29 PID 536 wrote to memory of 632 536 vcredist_x64.exe 29 PID 536 wrote to memory of 632 536 vcredist_x64.exe 29 PID 536 wrote to memory of 632 536 vcredist_x64.exe 29 PID 536 wrote to memory of 632 536 vcredist_x64.exe 29 PID 536 wrote to memory of 632 536 vcredist_x64.exe 29 PID 536 wrote to memory of 632 536 vcredist_x64.exe 29 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30 PID 632 wrote to memory of 1180 632 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bd9d.exe"C:\Users\Admin\AppData\Local\Temp\8bd9d.exe"1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 100 19562⤵
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
C:\ProgramData\Packages\vcredist_x64.exe"C:\ProgramData\Packages\vcredist_x64.exe" 200 01⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 632 13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD599ee1e21a34b0536b120d4a6977fd252
SHA124c50b507febd6e2b81154d3d80401dd9207e3e1
SHA2568bd9dfcfd59b0e2073caf8c0fc8740a01f8c7eabb6239a9b714d3b41a3793b95
SHA51203cafd628d19cda98db021fb009500105906617ab414c9ba6087c693cacdb36159d1973d21af2b275da136dbb10157f97c243ca1ae7ea198ae99d74427e26408