Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-06-2022 05:12
Static task
static1
Behavioral task
behavioral1
Sample
2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe
Resource
win7-20220414-en
General
-
Target
2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe
-
Size
248KB
-
MD5
cc7b091b94c4f0641b180417b017fec2
-
SHA1
17c59c9bdc7ac4ef8abdca087fdfeefef816f597
-
SHA256
2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6
-
SHA512
5c5106833eec8cc386171ff519be0af91493305af9fd2bb632ef19907b88c1633bc7a1b30b068659db3fc8d378b918363c5d8c79064600e4b5f1a83cf93b2461
Malware Config
Signatures
-
Detects PlugX Payload 7 IoCs
resource yara_rule behavioral2/memory/4528-141-0x0000000000E70000-0x0000000000EA8000-memory.dmp family_plugx behavioral2/memory/2124-143-0x0000000000750000-0x0000000000788000-memory.dmp family_plugx behavioral2/memory/2364-145-0x0000000000E00000-0x0000000000E38000-memory.dmp family_plugx behavioral2/memory/1632-144-0x0000000002180000-0x00000000021B8000-memory.dmp family_plugx behavioral2/memory/3480-147-0x0000000000870000-0x00000000008A8000-memory.dmp family_plugx behavioral2/memory/2364-148-0x0000000000E00000-0x0000000000E38000-memory.dmp family_plugx behavioral2/memory/3480-149-0x0000000000870000-0x00000000008A8000-memory.dmp family_plugx -
Executes dropped EXE 2 IoCs
pid Process 1632 NvSmart.exe 4528 NvSmart.exe -
Loads dropped DLL 2 IoCs
pid Process 1632 NvSmart.exe 4528 NvSmart.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files 2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe File opened for modification C:\Program Files (x86)\Common Files\boot.ldr 2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe File created C:\Program Files (x86)\Common Files\boot.ldr 2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe File opened for modification C:\Program Files (x86)\Common Files\NvSmart.exe 2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe File created C:\Program Files (x86)\Common Files\NvSmart.exe 2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe File opened for modification C:\Program Files (x86)\Common Files\NvSmartMax.dll 2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe File created C:\Program Files (x86)\Common Files\NvSmartMax.dll 2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 33003300440045003400300039004600370042004600440033003000430034000000 svchost.exe Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 2364 svchost.exe 2364 svchost.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 2364 svchost.exe 2364 svchost.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 2364 svchost.exe 3480 msiexec.exe 2364 svchost.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 2364 svchost.exe 2364 svchost.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 3480 msiexec.exe 2364 svchost.exe 2364 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2364 svchost.exe 3480 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2124 2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe Token: SeTcbPrivilege 2124 2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe Token: SeDebugPrivilege 1632 NvSmart.exe Token: SeTcbPrivilege 1632 NvSmart.exe Token: SeDebugPrivilege 4528 NvSmart.exe Token: SeTcbPrivilege 4528 NvSmart.exe Token: SeDebugPrivilege 2364 svchost.exe Token: SeTcbPrivilege 2364 svchost.exe Token: SeDebugPrivilege 3480 msiexec.exe Token: SeTcbPrivilege 3480 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4528 wrote to memory of 2364 4528 NvSmart.exe 84 PID 4528 wrote to memory of 2364 4528 NvSmart.exe 84 PID 4528 wrote to memory of 2364 4528 NvSmart.exe 84 PID 4528 wrote to memory of 2364 4528 NvSmart.exe 84 PID 4528 wrote to memory of 2364 4528 NvSmart.exe 84 PID 4528 wrote to memory of 2364 4528 NvSmart.exe 84 PID 4528 wrote to memory of 2364 4528 NvSmart.exe 84 PID 4528 wrote to memory of 2364 4528 NvSmart.exe 84 PID 2364 wrote to memory of 3480 2364 svchost.exe 85 PID 2364 wrote to memory of 3480 2364 svchost.exe 85 PID 2364 wrote to memory of 3480 2364 svchost.exe 85 PID 2364 wrote to memory of 3480 2364 svchost.exe 85 PID 2364 wrote to memory of 3480 2364 svchost.exe 85 PID 2364 wrote to memory of 3480 2364 svchost.exe 85 PID 2364 wrote to memory of 3480 2364 svchost.exe 85 PID 2364 wrote to memory of 3480 2364 svchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe"C:\Users\Admin\AppData\Local\Temp\2a8d18a59cd648637deb830079b460008d81411681f0eb41dc327c3f447326f6.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
C:\Program Files (x86)\Common Files\NvSmart.exe"C:\Program Files (x86)\Common Files\NvSmart.exe" 100 21241⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
C:\Program Files (x86)\Common Files\NvSmart.exe"C:\Program Files (x86)\Common Files\NvSmart.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 23643⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
3KB
MD544b4d9c4782f883fa8c0a1da3ff6a07e
SHA1275237d091bb2e363ca93f4f06de5046f7373362
SHA25669c58341551bd76578085b961f01cac3607d9c16b3f9d23f90862b6d0328eeab
SHA512267a11c1bcdd97e4cd8dffb45f935c6de07008485522ac1af5130bebdbebb496ede792b9e1ee6799c53b3778157d1f08c2713e4f1f0d6c1a7fb9ac3b84dceed4
-
Filesize
3KB
MD544b4d9c4782f883fa8c0a1da3ff6a07e
SHA1275237d091bb2e363ca93f4f06de5046f7373362
SHA25669c58341551bd76578085b961f01cac3607d9c16b3f9d23f90862b6d0328eeab
SHA512267a11c1bcdd97e4cd8dffb45f935c6de07008485522ac1af5130bebdbebb496ede792b9e1ee6799c53b3778157d1f08c2713e4f1f0d6c1a7fb9ac3b84dceed4
-
Filesize
3KB
MD544b4d9c4782f883fa8c0a1da3ff6a07e
SHA1275237d091bb2e363ca93f4f06de5046f7373362
SHA25669c58341551bd76578085b961f01cac3607d9c16b3f9d23f90862b6d0328eeab
SHA512267a11c1bcdd97e4cd8dffb45f935c6de07008485522ac1af5130bebdbebb496ede792b9e1ee6799c53b3778157d1f08c2713e4f1f0d6c1a7fb9ac3b84dceed4
-
Filesize
155KB
MD5d0f2dc03884bea2697f1ce65453c82d6
SHA1d37de393c9b5d90ce3a1c4c751fee64360599b2f
SHA2560ac3176b7bb40140e593feda97e9ed8bbf420daeaa6043151dbaacddf503b52a
SHA512cad8a52baaa5a4032515aa3c34a2c528d76d09d1f8fb81b3a100f47a80cbdc381158766723f09c33f4974009a211512ab4cc103c423e61b683ba8454330edd50
-
Filesize
622B
MD5f1a57daef261ba417accebcb81a2c3f5
SHA1f45b5d95dd80ce307aafaf06420ed09306acc952
SHA256d3546ed7c8e98d833e2e3153d5cbe3f6f5b585e928ff5cdb39d63ff6ce8716aa
SHA512115b6dc3ca569663210b90e1547cdc72abccc8ac42bec0608602f149a028b7273630445fd494a882e4cc8cf25f4033bdcb98454f816a814863a580e0525c0357