Analysis

  • max time kernel
    168s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 03:52

General

  • Target

    3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe

  • Size

    364KB

  • MD5

    3bdcd75949bc028311649557395aad17

  • SHA1

    7c1c010814a2308891a54a095fa2b57a178b9bc6

  • SHA256

    3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8

  • SHA512

    2edaf28d957a23bf3cef4df128fef096bc71a07adcc45028d05740392328619c37ac008b3e3303457d3598c9fd3638ee980511010311a903d96dfa85eb34d9ab

Score
10/10

Malware Config

Signatures

  • Detects PlugX Payload 6 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe
    "C:\Users\Admin\AppData\Local\Temp\3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mcvsmap.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\mcvsmap.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:4112
  • C:\ProgramData\VirusMap\mcvsmap.exe
    C:\ProgramData\VirusMap\mcvsmap.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 201 0
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\SysWOW64\msiexec.exe
        C:\Windows\system32\msiexec.exe 209 2556
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1928

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\SxS\bug.log
    Filesize

    456B

    MD5

    9994b95fef9bc53b16fa886f27588144

    SHA1

    647e1b342cb7b1727c8ab2de5c635470d0836c02

    SHA256

    f43dbe1253a06d676b74d837f9ece25ce01cd0686f63c7034e74fd5ece5b7c75

    SHA512

    775c22269f2b9b39322a007e4cd4310d7748d325d015c4a4a887983211c266477c3b682201aac1538b02923adfd6711dd1a6cc254251b26a008daa19b34421d6

  • C:\ProgramData\SxS\bug.log
    Filesize

    618B

    MD5

    f912739373ada6b8861481e18dcbd342

    SHA1

    715e5a2034437947a2b211e4295cbe2024c0e927

    SHA256

    0affc64775bd2f7c2bbbbf1a8041e2791d78af369a4c14dfa224904fd33107d9

    SHA512

    f962360a0c86cd8f2416ac22a689d4e1b1a131bb75aba6af5801d6174b531979b18f47cf9e86a1efaaeb1709993a14182de57c5013a72c29396d395622c38f3b

  • C:\ProgramData\VirusMap\McUtil.DLL
    Filesize

    48KB

    MD5

    ad4a646b38a482cc07d5b09b4fffd3b3

    SHA1

    ae0f9bf2740d00c5d485827eb32aca33feaa3a90

    SHA256

    0a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48

    SHA512

    0a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1

  • C:\ProgramData\VirusMap\McUtil.dll
    Filesize

    48KB

    MD5

    ad4a646b38a482cc07d5b09b4fffd3b3

    SHA1

    ae0f9bf2740d00c5d485827eb32aca33feaa3a90

    SHA256

    0a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48

    SHA512

    0a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1

  • C:\ProgramData\VirusMap\McUtil.dll.PPT
    Filesize

    121KB

    MD5

    6bbba1416a6f16da14bf93e15c417282

    SHA1

    8688eb1bed03797ff0b14376867712de27d85078

    SHA256

    5341ec0c5356057d480550068cd4ef0d49ccb5e113b39f044a934f6ce98be627

    SHA512

    3700940923a9cc584d07406b9b33dedc09ef0f4a33663d97dc3ca441bab43b0407228d135e729b9ce9493b66c66e4c69c54dbf0cfae99cf08848f1f1433eb27d

  • C:\ProgramData\VirusMap\mcvsmap.exe
    Filesize

    256KB

    MD5

    4e1e0b8b0673937415599bf2f24c44ad

    SHA1

    9224de3af2a246011c6294f64f27206d165317ba

    SHA256

    ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096

    SHA512

    87f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d

  • C:\ProgramData\VirusMap\mcvsmap.exe
    Filesize

    256KB

    MD5

    4e1e0b8b0673937415599bf2f24c44ad

    SHA1

    9224de3af2a246011c6294f64f27206d165317ba

    SHA256

    ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096

    SHA512

    87f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\McUtil.DLL
    Filesize

    48KB

    MD5

    ad4a646b38a482cc07d5b09b4fffd3b3

    SHA1

    ae0f9bf2740d00c5d485827eb32aca33feaa3a90

    SHA256

    0a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48

    SHA512

    0a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\McUtil.dll
    Filesize

    48KB

    MD5

    ad4a646b38a482cc07d5b09b4fffd3b3

    SHA1

    ae0f9bf2740d00c5d485827eb32aca33feaa3a90

    SHA256

    0a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48

    SHA512

    0a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\McUtil.dll.PPT
    Filesize

    121KB

    MD5

    6bbba1416a6f16da14bf93e15c417282

    SHA1

    8688eb1bed03797ff0b14376867712de27d85078

    SHA256

    5341ec0c5356057d480550068cd4ef0d49ccb5e113b39f044a934f6ce98be627

    SHA512

    3700940923a9cc584d07406b9b33dedc09ef0f4a33663d97dc3ca441bab43b0407228d135e729b9ce9493b66c66e4c69c54dbf0cfae99cf08848f1f1433eb27d

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mcvsmap.exe
    Filesize

    256KB

    MD5

    4e1e0b8b0673937415599bf2f24c44ad

    SHA1

    9224de3af2a246011c6294f64f27206d165317ba

    SHA256

    ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096

    SHA512

    87f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\mcvsmap.exe
    Filesize

    256KB

    MD5

    4e1e0b8b0673937415599bf2f24c44ad

    SHA1

    9224de3af2a246011c6294f64f27206d165317ba

    SHA256

    ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096

    SHA512

    87f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d

  • memory/1928-148-0x0000000000000000-mapping.dmp
  • memory/1928-149-0x0000000000C70000-0x0000000000CA1000-memory.dmp
    Filesize

    196KB

  • memory/1928-151-0x0000000000C70000-0x0000000000CA1000-memory.dmp
    Filesize

    196KB

  • memory/1956-144-0x0000000000D90000-0x0000000000DC1000-memory.dmp
    Filesize

    196KB

  • memory/2556-143-0x0000000000000000-mapping.dmp
  • memory/2556-147-0x0000000001300000-0x0000000001331000-memory.dmp
    Filesize

    196KB

  • memory/2556-150-0x0000000001300000-0x0000000001331000-memory.dmp
    Filesize

    196KB

  • memory/4112-130-0x0000000000000000-mapping.dmp
  • memory/4112-136-0x00000000020B0000-0x00000000021B0000-memory.dmp
    Filesize

    1024KB

  • memory/4112-137-0x00000000021F0000-0x0000000002221000-memory.dmp
    Filesize

    196KB