Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 03:18

General

  • Target

    12d59477048b530ad04242c8c8849b283051e71e02e136829b6e4152d144d096.exe

  • Size

    327KB

  • MD5

    c48cdf2ce519307358ead3512e31f264

  • SHA1

    47ac40fe2bee7931c15450ec7e2c556d15fa5149

  • SHA256

    12d59477048b530ad04242c8c8849b283051e71e02e136829b6e4152d144d096

  • SHA512

    fbb6b5f776b3853827b780516ba71a394a84845f0c51a1370c3d834db18cf91341edb87a1e0af8c9be550790b64bf192c2ed1ce57e343e32e03740c0a54e4446

Score
10/10

Malware Config

Signatures

  • Detects PlugX Payload 5 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • suricata: ET MALWARE PlugX/Destory HTTP traffic

    suricata: ET MALWARE PlugX/Destory HTTP traffic

  • suricata: ET MALWARE Possible PlugX Common Header Struct

    suricata: ET MALWARE Possible PlugX Common Header Struct

  • suricata: ET MALWARE UPDATE Protocol Trojan Communication detected on http ports 2

    suricata: ET MALWARE UPDATE Protocol Trojan Communication detected on http ports 2

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12d59477048b530ad04242c8c8849b283051e71e02e136829b6e4152d144d096.exe
    "C:\Users\Admin\AppData\Local\Temp\12d59477048b530ad04242c8c8849b283051e71e02e136829b6e4152d144d096.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\hkcmd.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\hkcmd.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1324
  • C:\ProgramData\Replicat\hkcmd.exe
    "C:\ProgramData\Replicat\hkcmd.exe" 100 1324
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:1832
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\system32\svchost.exe 201 0
    1⤵
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\msiexec.exe
      C:\Windows\system32\msiexec.exe 209 1948
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1808
  • C:\ProgramData\Replicat\hkcmd.exe
    "C:\ProgramData\Replicat\hkcmd.exe" 200 0
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:472

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Replicat\hccutils.DLL
    Filesize

    42KB

    MD5

    58c11dd3a9f257869bc362c7a5bc85f1

    SHA1

    b0760b148581c43b3b2b828f39c96eb7f83e7498

    SHA256

    2bda8230b5f1afc3e9d8c5f2c0845a6964559b7dc7daf8ecefa306a57e628c52

    SHA512

    da9fd3851ab015f9864109d3e7bb4ade3a4024650c7db23a9310ed8d0aa742502506b630b2f61863fbf86ceb859a1d06931ec097d6a43e224a19e98dc43118ea

  • C:\ProgramData\Replicat\hccutils.DLL.res
    Filesize

    110KB

    MD5

    824ee49166f2cfb45c573434fb588dde

    SHA1

    3fbb6160d9ba5a8a3688eaeaed7e43127ac16fb6

    SHA256

    ec0351014319f6631082e36a773d72f4fd04a346ec0ca6299b118d0cafacbafc

    SHA512

    ae2ea934e0f3f7753a3f2d716da467150ae31acf945dea0d3eb8e8b7b904b8aa0b64c66097a33ff5e4093175234bfe54db7f0a54b7a61a092b64680c7dd9cf41

  • C:\ProgramData\Replicat\hkcmd.exe
    Filesize

    169KB

    MD5

    0d58e5f4e82539de38ba7f9b4a8dda12

    SHA1

    dd0f39f4d77e1bb347321aa22b5a9d5c1cc65342

    SHA256

    e2c6ec8ea8da05b23327c1d0e350e219c4823d41c2ed98bae9bd2d9b48b8613d

    SHA512

    149c5dcb225829744d632d9c118427c5074d0413246b6e08470cac2aeffdf25504007b98219d6b2b454a20069065168c4c21ad4d9d926d98ab97c45585f37ee3

  • C:\ProgramData\Replicat\hkcmd.exe
    Filesize

    169KB

    MD5

    0d58e5f4e82539de38ba7f9b4a8dda12

    SHA1

    dd0f39f4d77e1bb347321aa22b5a9d5c1cc65342

    SHA256

    e2c6ec8ea8da05b23327c1d0e350e219c4823d41c2ed98bae9bd2d9b48b8613d

    SHA512

    149c5dcb225829744d632d9c118427c5074d0413246b6e08470cac2aeffdf25504007b98219d6b2b454a20069065168c4c21ad4d9d926d98ab97c45585f37ee3

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\hccutils.DLL
    Filesize

    42KB

    MD5

    58c11dd3a9f257869bc362c7a5bc85f1

    SHA1

    b0760b148581c43b3b2b828f39c96eb7f83e7498

    SHA256

    2bda8230b5f1afc3e9d8c5f2c0845a6964559b7dc7daf8ecefa306a57e628c52

    SHA512

    da9fd3851ab015f9864109d3e7bb4ade3a4024650c7db23a9310ed8d0aa742502506b630b2f61863fbf86ceb859a1d06931ec097d6a43e224a19e98dc43118ea

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\hccutils.DLL.res
    Filesize

    110KB

    MD5

    824ee49166f2cfb45c573434fb588dde

    SHA1

    3fbb6160d9ba5a8a3688eaeaed7e43127ac16fb6

    SHA256

    ec0351014319f6631082e36a773d72f4fd04a346ec0ca6299b118d0cafacbafc

    SHA512

    ae2ea934e0f3f7753a3f2d716da467150ae31acf945dea0d3eb8e8b7b904b8aa0b64c66097a33ff5e4093175234bfe54db7f0a54b7a61a092b64680c7dd9cf41

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\hkcmd.exe
    Filesize

    169KB

    MD5

    0d58e5f4e82539de38ba7f9b4a8dda12

    SHA1

    dd0f39f4d77e1bb347321aa22b5a9d5c1cc65342

    SHA256

    e2c6ec8ea8da05b23327c1d0e350e219c4823d41c2ed98bae9bd2d9b48b8613d

    SHA512

    149c5dcb225829744d632d9c118427c5074d0413246b6e08470cac2aeffdf25504007b98219d6b2b454a20069065168c4c21ad4d9d926d98ab97c45585f37ee3

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\hkcmd.exe
    Filesize

    169KB

    MD5

    0d58e5f4e82539de38ba7f9b4a8dda12

    SHA1

    dd0f39f4d77e1bb347321aa22b5a9d5c1cc65342

    SHA256

    e2c6ec8ea8da05b23327c1d0e350e219c4823d41c2ed98bae9bd2d9b48b8613d

    SHA512

    149c5dcb225829744d632d9c118427c5074d0413246b6e08470cac2aeffdf25504007b98219d6b2b454a20069065168c4c21ad4d9d926d98ab97c45585f37ee3

  • \ProgramData\Replicat\hccutils.dll
    Filesize

    42KB

    MD5

    58c11dd3a9f257869bc362c7a5bc85f1

    SHA1

    b0760b148581c43b3b2b828f39c96eb7f83e7498

    SHA256

    2bda8230b5f1afc3e9d8c5f2c0845a6964559b7dc7daf8ecefa306a57e628c52

    SHA512

    da9fd3851ab015f9864109d3e7bb4ade3a4024650c7db23a9310ed8d0aa742502506b630b2f61863fbf86ceb859a1d06931ec097d6a43e224a19e98dc43118ea

  • \ProgramData\Replicat\hccutils.dll
    Filesize

    42KB

    MD5

    58c11dd3a9f257869bc362c7a5bc85f1

    SHA1

    b0760b148581c43b3b2b828f39c96eb7f83e7498

    SHA256

    2bda8230b5f1afc3e9d8c5f2c0845a6964559b7dc7daf8ecefa306a57e628c52

    SHA512

    da9fd3851ab015f9864109d3e7bb4ade3a4024650c7db23a9310ed8d0aa742502506b630b2f61863fbf86ceb859a1d06931ec097d6a43e224a19e98dc43118ea

  • \Users\Admin\AppData\Local\Temp\RarSFX0\hccutils.dll
    Filesize

    42KB

    MD5

    58c11dd3a9f257869bc362c7a5bc85f1

    SHA1

    b0760b148581c43b3b2b828f39c96eb7f83e7498

    SHA256

    2bda8230b5f1afc3e9d8c5f2c0845a6964559b7dc7daf8ecefa306a57e628c52

    SHA512

    da9fd3851ab015f9864109d3e7bb4ade3a4024650c7db23a9310ed8d0aa742502506b630b2f61863fbf86ceb859a1d06931ec097d6a43e224a19e98dc43118ea

  • \Users\Admin\AppData\Local\Temp\RarSFX0\hkcmd.exe
    Filesize

    169KB

    MD5

    0d58e5f4e82539de38ba7f9b4a8dda12

    SHA1

    dd0f39f4d77e1bb347321aa22b5a9d5c1cc65342

    SHA256

    e2c6ec8ea8da05b23327c1d0e350e219c4823d41c2ed98bae9bd2d9b48b8613d

    SHA512

    149c5dcb225829744d632d9c118427c5074d0413246b6e08470cac2aeffdf25504007b98219d6b2b454a20069065168c4c21ad4d9d926d98ab97c45585f37ee3

  • \Users\Admin\AppData\Local\Temp\RarSFX0\hkcmd.exe
    Filesize

    169KB

    MD5

    0d58e5f4e82539de38ba7f9b4a8dda12

    SHA1

    dd0f39f4d77e1bb347321aa22b5a9d5c1cc65342

    SHA256

    e2c6ec8ea8da05b23327c1d0e350e219c4823d41c2ed98bae9bd2d9b48b8613d

    SHA512

    149c5dcb225829744d632d9c118427c5074d0413246b6e08470cac2aeffdf25504007b98219d6b2b454a20069065168c4c21ad4d9d926d98ab97c45585f37ee3

  • \Users\Admin\AppData\Local\Temp\RarSFX0\hkcmd.exe
    Filesize

    169KB

    MD5

    0d58e5f4e82539de38ba7f9b4a8dda12

    SHA1

    dd0f39f4d77e1bb347321aa22b5a9d5c1cc65342

    SHA256

    e2c6ec8ea8da05b23327c1d0e350e219c4823d41c2ed98bae9bd2d9b48b8613d

    SHA512

    149c5dcb225829744d632d9c118427c5074d0413246b6e08470cac2aeffdf25504007b98219d6b2b454a20069065168c4c21ad4d9d926d98ab97c45585f37ee3

  • \Users\Admin\AppData\Local\Temp\RarSFX0\hkcmd.exe
    Filesize

    169KB

    MD5

    0d58e5f4e82539de38ba7f9b4a8dda12

    SHA1

    dd0f39f4d77e1bb347321aa22b5a9d5c1cc65342

    SHA256

    e2c6ec8ea8da05b23327c1d0e350e219c4823d41c2ed98bae9bd2d9b48b8613d

    SHA512

    149c5dcb225829744d632d9c118427c5074d0413246b6e08470cac2aeffdf25504007b98219d6b2b454a20069065168c4c21ad4d9d926d98ab97c45585f37ee3

  • memory/472-81-0x0000000000460000-0x000000000048C000-memory.dmp
    Filesize

    176KB

  • memory/1324-59-0x0000000000000000-mapping.dmp
  • memory/1324-82-0x00000000003D0000-0x00000000003FC000-memory.dmp
    Filesize

    176KB

  • memory/1324-65-0x0000000000240000-0x0000000000340000-memory.dmp
    Filesize

    1024KB

  • memory/1808-87-0x0000000000000000-mapping.dmp
  • memory/1808-89-0x0000000000250000-0x000000000027C000-memory.dmp
    Filesize

    176KB

  • memory/1832-83-0x0000000000280000-0x00000000002AC000-memory.dmp
    Filesize

    176KB

  • memory/1880-54-0x0000000075A61000-0x0000000075A63000-memory.dmp
    Filesize

    8KB

  • memory/1948-77-0x00000000000A0000-0x00000000000BA000-memory.dmp
    Filesize

    104KB

  • memory/1948-79-0x0000000000000000-mapping.dmp
  • memory/1948-84-0x00000000001B0000-0x00000000001DC000-memory.dmp
    Filesize

    176KB