Analysis
-
max time kernel
168s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 03:52
Static task
static1
Behavioral task
behavioral1
Sample
3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe
Resource
win7-20220414-en
General
-
Target
3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe
-
Size
364KB
-
MD5
3bdcd75949bc028311649557395aad17
-
SHA1
7c1c010814a2308891a54a095fa2b57a178b9bc6
-
SHA256
3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8
-
SHA512
2edaf28d957a23bf3cef4df128fef096bc71a07adcc45028d05740392328619c37ac008b3e3303457d3598c9fd3638ee980511010311a903d96dfa85eb34d9ab
Malware Config
Signatures
-
Detects PlugX Payload 6 IoCs
resource yara_rule behavioral2/memory/4112-137-0x00000000021F0000-0x0000000002221000-memory.dmp family_plugx behavioral2/memory/1956-144-0x0000000000D90000-0x0000000000DC1000-memory.dmp family_plugx behavioral2/memory/2556-147-0x0000000001300000-0x0000000001331000-memory.dmp family_plugx behavioral2/memory/1928-149-0x0000000000C70000-0x0000000000CA1000-memory.dmp family_plugx behavioral2/memory/2556-150-0x0000000001300000-0x0000000001331000-memory.dmp family_plugx behavioral2/memory/1928-151-0x0000000000C70000-0x0000000000CA1000-memory.dmp family_plugx -
Executes dropped EXE 2 IoCs
pid Process 4112 mcvsmap.exe 1956 mcvsmap.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe -
Loads dropped DLL 2 IoCs
pid Process 4112 mcvsmap.exe 1956 mcvsmap.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 44003500370037003600320036004100380031004400390039003700410031000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2556 svchost.exe 2556 svchost.exe 2556 svchost.exe 2556 svchost.exe 2556 svchost.exe 2556 svchost.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 2556 svchost.exe 2556 svchost.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 2556 svchost.exe 2556 svchost.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 2556 svchost.exe 2556 svchost.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 2556 svchost.exe 2556 svchost.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe 1928 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2556 svchost.exe 1928 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4112 mcvsmap.exe Token: SeTcbPrivilege 4112 mcvsmap.exe Token: SeDebugPrivilege 1956 mcvsmap.exe Token: SeTcbPrivilege 1956 mcvsmap.exe Token: SeDebugPrivilege 2556 svchost.exe Token: SeTcbPrivilege 2556 svchost.exe Token: SeDebugPrivilege 1928 msiexec.exe Token: SeTcbPrivilege 1928 msiexec.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4112 1596 3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe 82 PID 1596 wrote to memory of 4112 1596 3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe 82 PID 1596 wrote to memory of 4112 1596 3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe 82 PID 1956 wrote to memory of 2556 1956 mcvsmap.exe 85 PID 1956 wrote to memory of 2556 1956 mcvsmap.exe 85 PID 1956 wrote to memory of 2556 1956 mcvsmap.exe 85 PID 1956 wrote to memory of 2556 1956 mcvsmap.exe 85 PID 1956 wrote to memory of 2556 1956 mcvsmap.exe 85 PID 1956 wrote to memory of 2556 1956 mcvsmap.exe 85 PID 1956 wrote to memory of 2556 1956 mcvsmap.exe 85 PID 1956 wrote to memory of 2556 1956 mcvsmap.exe 85 PID 2556 wrote to memory of 1928 2556 svchost.exe 86 PID 2556 wrote to memory of 1928 2556 svchost.exe 86 PID 2556 wrote to memory of 1928 2556 svchost.exe 86 PID 2556 wrote to memory of 1928 2556 svchost.exe 86 PID 2556 wrote to memory of 1928 2556 svchost.exe 86 PID 2556 wrote to memory of 1928 2556 svchost.exe 86 PID 2556 wrote to memory of 1928 2556 svchost.exe 86 PID 2556 wrote to memory of 1928 2556 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe"C:\Users\Admin\AppData\Local\Temp\3a6f18436a355dccb1b0baa715824e201bfbe0307683e7f726b33bee4fd2c2b8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\mcvsmap.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\mcvsmap.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\ProgramData\VirusMap\mcvsmap.exeC:\ProgramData\VirusMap\mcvsmap.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 25563⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456B
MD59994b95fef9bc53b16fa886f27588144
SHA1647e1b342cb7b1727c8ab2de5c635470d0836c02
SHA256f43dbe1253a06d676b74d837f9ece25ce01cd0686f63c7034e74fd5ece5b7c75
SHA512775c22269f2b9b39322a007e4cd4310d7748d325d015c4a4a887983211c266477c3b682201aac1538b02923adfd6711dd1a6cc254251b26a008daa19b34421d6
-
Filesize
618B
MD5f912739373ada6b8861481e18dcbd342
SHA1715e5a2034437947a2b211e4295cbe2024c0e927
SHA2560affc64775bd2f7c2bbbbf1a8041e2791d78af369a4c14dfa224904fd33107d9
SHA512f962360a0c86cd8f2416ac22a689d4e1b1a131bb75aba6af5801d6174b531979b18f47cf9e86a1efaaeb1709993a14182de57c5013a72c29396d395622c38f3b
-
Filesize
48KB
MD5ad4a646b38a482cc07d5b09b4fffd3b3
SHA1ae0f9bf2740d00c5d485827eb32aca33feaa3a90
SHA2560a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48
SHA5120a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1
-
Filesize
48KB
MD5ad4a646b38a482cc07d5b09b4fffd3b3
SHA1ae0f9bf2740d00c5d485827eb32aca33feaa3a90
SHA2560a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48
SHA5120a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1
-
Filesize
121KB
MD56bbba1416a6f16da14bf93e15c417282
SHA18688eb1bed03797ff0b14376867712de27d85078
SHA2565341ec0c5356057d480550068cd4ef0d49ccb5e113b39f044a934f6ce98be627
SHA5123700940923a9cc584d07406b9b33dedc09ef0f4a33663d97dc3ca441bab43b0407228d135e729b9ce9493b66c66e4c69c54dbf0cfae99cf08848f1f1433eb27d
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d
-
Filesize
48KB
MD5ad4a646b38a482cc07d5b09b4fffd3b3
SHA1ae0f9bf2740d00c5d485827eb32aca33feaa3a90
SHA2560a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48
SHA5120a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1
-
Filesize
48KB
MD5ad4a646b38a482cc07d5b09b4fffd3b3
SHA1ae0f9bf2740d00c5d485827eb32aca33feaa3a90
SHA2560a99238e1ebebc47d7a89b2ccddfae537479f7f77322b5d4941315d3f7e5ca48
SHA5120a09420c939f71c26fabdc5a036e8e98413e6dbb70552a6b0a277abcf0cd1dcc8f2950631909bdddad97049d80312a4eeada6a1952dd51ebc9d5b38eb50866a1
-
Filesize
121KB
MD56bbba1416a6f16da14bf93e15c417282
SHA18688eb1bed03797ff0b14376867712de27d85078
SHA2565341ec0c5356057d480550068cd4ef0d49ccb5e113b39f044a934f6ce98be627
SHA5123700940923a9cc584d07406b9b33dedc09ef0f4a33663d97dc3ca441bab43b0407228d135e729b9ce9493b66c66e4c69c54dbf0cfae99cf08848f1f1433eb27d
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d
-
Filesize
256KB
MD54e1e0b8b0673937415599bf2f24c44ad
SHA19224de3af2a246011c6294f64f27206d165317ba
SHA256ae16e10e621d6610a3f7f2c7122f9d1263700ba02d1b90e42798decb2fe84096
SHA51287f4407045f2213ecc76fb73e6b717ffc503e0c042be118965a139e7178fdcc2ff02fe0904cde3102679c4a74d09224e24f64dbd9faa609e06a6ce2fcda0ab5d