Analysis

  • max time kernel
    162s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 07:28

General

  • Target

    f98f1aa93dcebd227365c1c1278c74a043a1a1f24b056e6f99645b9f1b75d873.exe

  • Size

    641KB

  • MD5

    4694b4224c4cfe637ad61aa3df54b32f

  • SHA1

    29670fa70efbf983c566c424ecf2c291efeb219d

  • SHA256

    f98f1aa93dcebd227365c1c1278c74a043a1a1f24b056e6f99645b9f1b75d873

  • SHA512

    242b8e5d726007e6d25c524a20c2dd7d61ece52f5049e349edf813089f339d61fea3e3aa27c7801469b128b9dd47129f6a47beabd8eb7d9a2ea2d2c8818b65a8

Score
10/10

Malware Config

Signatures

  • Detects PlugX Payload 8 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f98f1aa93dcebd227365c1c1278c74a043a1a1f24b056e6f99645b9f1b75d873.exe
    "C:\Users\Admin\AppData\Local\Temp\f98f1aa93dcebd227365c1c1278c74a043a1a1f24b056e6f99645b9f1b75d873.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1.hwp
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1.hwp"
        3⤵
        • Suspicious use of SetWindowsHookEx
        PID:472
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Users\Admin\AppData\Local\Temp\QQBrowserUpdateService.exe
        C:\Users\Admin\AppData\Local\Temp\QQBrowserUpdateService.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1716
  • C:\ProgramData\QQBrowser\QQBrowserUpdateService.exe
    "C:\ProgramData\QQBrowser\QQBrowserUpdateService.exe" 100 1716
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:1536
  • C:\ProgramData\QQBrowser\QQBrowserUpdateService.exe
    "C:\ProgramData\QQBrowser\QQBrowserUpdateService.exe" 200 0
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 201 0
      2⤵
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\SysWOW64\msiexec.exe
        C:\Windows\system32\msiexec.exe 209 1928
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1216

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\QQBrowser\QQBrowserUpdateService.exe
    Filesize

    204KB

    MD5

    bf8c7b6e88a049fda4ebd7407488aca6

    SHA1

    8b889494f25aafcef5e92b6cc7b2e0e0e217e60a

    SHA256

    28e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2

    SHA512

    35a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08

  • C:\ProgramData\QQBrowser\QQBrowserUpdateService.exe
    Filesize

    204KB

    MD5

    bf8c7b6e88a049fda4ebd7407488aca6

    SHA1

    8b889494f25aafcef5e92b6cc7b2e0e0e217e60a

    SHA256

    28e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2

    SHA512

    35a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08

  • C:\ProgramData\QQBrowser\pdh.dll
    Filesize

    4KB

    MD5

    ee392dd013dac7effac7c4f51b4ba29a

    SHA1

    78c0a384b68107f0908470a8c24a4f80e531ac93

    SHA256

    f8a17a0d39ca2269236ac977a910c93d70367cf301b56de6754ac529e90d1b72

    SHA512

    c730315243cdbe337ad89207dc46611b06f6e385a18f46057dfb475b974a7dfac920d41268c43c418fd304df1314467b35ea26469949555cada73ae4892deda0

  • C:\ProgramData\QQBrowser\pdh.dll.pak
    Filesize

    111KB

    MD5

    60cd656c285d8180a88ead1f5f3aafa4

    SHA1

    ceecf0f90edb8ae14bec4858bfaff094f7ec75a6

    SHA256

    0fc0d32b98d949cb72d92ce0084885a297eb590810240104624669145a6a4d61

    SHA512

    6946af7c604cdde396ad751cb151fa927c697b310d2fa5b6789499ba6cdea0108444ba971f847a6f9e1abd2f3a641d8c3f9168dd6e22e3d4596030b39de5b5db

  • C:\Users\Admin\AppData\Local\Temp\1.hwp
    Filesize

    8KB

    MD5

    9ffb9819a6430c4c093ee8e6edac765e

    SHA1

    055f0d796d02d9208ea74a0f480700f9142a2a12

    SHA256

    bd1b592ec24485a30f38bcccc62d5f8061846024c680b45662df6752f010c467

    SHA512

    3f2cbbf5dbfa72529b061d4528c9999098a4e609901713b1cdfc153258c17b8f20e61162178bfca964489cc6586419a509be36748874809373a87c7dae641935

  • C:\Users\Admin\AppData\Local\Temp\2.exe
    Filesize

    345KB

    MD5

    f04e2abd27b72a89598e2a933595aaba

    SHA1

    d90b623bbf85813c1232b53e46fda33ec24c3bfe

    SHA256

    95852da6976c0b3f46eac1988490edd3a0b3e9165c17e3a6e934fd4f899fa204

    SHA512

    30792256f1b549cfe44c12d81c555c59952c3fdba3217a41544655ca942feff0dd72a5dc5b6ce3dd39fe2e642d6bd2c5331fa428b3518367c9ae13f3350b9a3a

  • C:\Users\Admin\AppData\Local\Temp\2.exe
    Filesize

    345KB

    MD5

    f04e2abd27b72a89598e2a933595aaba

    SHA1

    d90b623bbf85813c1232b53e46fda33ec24c3bfe

    SHA256

    95852da6976c0b3f46eac1988490edd3a0b3e9165c17e3a6e934fd4f899fa204

    SHA512

    30792256f1b549cfe44c12d81c555c59952c3fdba3217a41544655ca942feff0dd72a5dc5b6ce3dd39fe2e642d6bd2c5331fa428b3518367c9ae13f3350b9a3a

  • C:\Users\Admin\AppData\Local\Temp\QQBrowserUpdateService.exe
    Filesize

    204KB

    MD5

    bf8c7b6e88a049fda4ebd7407488aca6

    SHA1

    8b889494f25aafcef5e92b6cc7b2e0e0e217e60a

    SHA256

    28e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2

    SHA512

    35a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08

  • C:\Users\Admin\AppData\Local\Temp\QQBrowserUpdateService.exe
    Filesize

    204KB

    MD5

    bf8c7b6e88a049fda4ebd7407488aca6

    SHA1

    8b889494f25aafcef5e92b6cc7b2e0e0e217e60a

    SHA256

    28e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2

    SHA512

    35a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08

  • C:\Users\Admin\AppData\Local\Temp\pdh.dll
    Filesize

    4KB

    MD5

    ee392dd013dac7effac7c4f51b4ba29a

    SHA1

    78c0a384b68107f0908470a8c24a4f80e531ac93

    SHA256

    f8a17a0d39ca2269236ac977a910c93d70367cf301b56de6754ac529e90d1b72

    SHA512

    c730315243cdbe337ad89207dc46611b06f6e385a18f46057dfb475b974a7dfac920d41268c43c418fd304df1314467b35ea26469949555cada73ae4892deda0

  • C:\Users\Admin\AppData\Local\Temp\pdh.dll.pak
    Filesize

    111KB

    MD5

    60cd656c285d8180a88ead1f5f3aafa4

    SHA1

    ceecf0f90edb8ae14bec4858bfaff094f7ec75a6

    SHA256

    0fc0d32b98d949cb72d92ce0084885a297eb590810240104624669145a6a4d61

    SHA512

    6946af7c604cdde396ad751cb151fa927c697b310d2fa5b6789499ba6cdea0108444ba971f847a6f9e1abd2f3a641d8c3f9168dd6e22e3d4596030b39de5b5db

  • \ProgramData\QQBrowser\PDH.dll
    Filesize

    4KB

    MD5

    ee392dd013dac7effac7c4f51b4ba29a

    SHA1

    78c0a384b68107f0908470a8c24a4f80e531ac93

    SHA256

    f8a17a0d39ca2269236ac977a910c93d70367cf301b56de6754ac529e90d1b72

    SHA512

    c730315243cdbe337ad89207dc46611b06f6e385a18f46057dfb475b974a7dfac920d41268c43c418fd304df1314467b35ea26469949555cada73ae4892deda0

  • \ProgramData\QQBrowser\PDH.dll
    Filesize

    4KB

    MD5

    ee392dd013dac7effac7c4f51b4ba29a

    SHA1

    78c0a384b68107f0908470a8c24a4f80e531ac93

    SHA256

    f8a17a0d39ca2269236ac977a910c93d70367cf301b56de6754ac529e90d1b72

    SHA512

    c730315243cdbe337ad89207dc46611b06f6e385a18f46057dfb475b974a7dfac920d41268c43c418fd304df1314467b35ea26469949555cada73ae4892deda0

  • \Users\Admin\AppData\Local\Temp\2.exe
    Filesize

    345KB

    MD5

    f04e2abd27b72a89598e2a933595aaba

    SHA1

    d90b623bbf85813c1232b53e46fda33ec24c3bfe

    SHA256

    95852da6976c0b3f46eac1988490edd3a0b3e9165c17e3a6e934fd4f899fa204

    SHA512

    30792256f1b549cfe44c12d81c555c59952c3fdba3217a41544655ca942feff0dd72a5dc5b6ce3dd39fe2e642d6bd2c5331fa428b3518367c9ae13f3350b9a3a

  • \Users\Admin\AppData\Local\Temp\2.exe
    Filesize

    345KB

    MD5

    f04e2abd27b72a89598e2a933595aaba

    SHA1

    d90b623bbf85813c1232b53e46fda33ec24c3bfe

    SHA256

    95852da6976c0b3f46eac1988490edd3a0b3e9165c17e3a6e934fd4f899fa204

    SHA512

    30792256f1b549cfe44c12d81c555c59952c3fdba3217a41544655ca942feff0dd72a5dc5b6ce3dd39fe2e642d6bd2c5331fa428b3518367c9ae13f3350b9a3a

  • \Users\Admin\AppData\Local\Temp\2.exe
    Filesize

    345KB

    MD5

    f04e2abd27b72a89598e2a933595aaba

    SHA1

    d90b623bbf85813c1232b53e46fda33ec24c3bfe

    SHA256

    95852da6976c0b3f46eac1988490edd3a0b3e9165c17e3a6e934fd4f899fa204

    SHA512

    30792256f1b549cfe44c12d81c555c59952c3fdba3217a41544655ca942feff0dd72a5dc5b6ce3dd39fe2e642d6bd2c5331fa428b3518367c9ae13f3350b9a3a

  • \Users\Admin\AppData\Local\Temp\PDH.dll
    Filesize

    4KB

    MD5

    ee392dd013dac7effac7c4f51b4ba29a

    SHA1

    78c0a384b68107f0908470a8c24a4f80e531ac93

    SHA256

    f8a17a0d39ca2269236ac977a910c93d70367cf301b56de6754ac529e90d1b72

    SHA512

    c730315243cdbe337ad89207dc46611b06f6e385a18f46057dfb475b974a7dfac920d41268c43c418fd304df1314467b35ea26469949555cada73ae4892deda0

  • \Users\Admin\AppData\Local\Temp\QQBrowserUpdateService.exe
    Filesize

    204KB

    MD5

    bf8c7b6e88a049fda4ebd7407488aca6

    SHA1

    8b889494f25aafcef5e92b6cc7b2e0e0e217e60a

    SHA256

    28e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2

    SHA512

    35a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08

  • memory/472-75-0x0000000000000000-mapping.dmp
  • memory/1216-96-0x0000000000000000-mapping.dmp
  • memory/1216-99-0x0000000000320000-0x000000000034D000-memory.dmp
    Filesize

    180KB

  • memory/1216-100-0x0000000000320000-0x000000000034D000-memory.dmp
    Filesize

    180KB

  • memory/1336-60-0x0000000000000000-mapping.dmp
  • memory/1336-70-0x0000000000160000-0x00000000001A0000-memory.dmp
    Filesize

    256KB

  • memory/1536-93-0x0000000000350000-0x000000000037D000-memory.dmp
    Filesize

    180KB

  • memory/1536-82-0x0000000000350000-0x000000000037D000-memory.dmp
    Filesize

    180KB

  • memory/1716-64-0x0000000000000000-mapping.dmp
  • memory/1716-73-0x00000000002B0000-0x00000000002DD000-memory.dmp
    Filesize

    180KB

  • memory/1716-72-0x0000000000440000-0x0000000000540000-memory.dmp
    Filesize

    1024KB

  • memory/1764-55-0x0000000000000000-mapping.dmp
  • memory/1904-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp
    Filesize

    8KB

  • memory/1928-87-0x00000000000A0000-0x00000000000BB000-memory.dmp
    Filesize

    108KB

  • memory/1928-89-0x0000000000000000-mapping.dmp
  • memory/1928-92-0x0000000000250000-0x000000000027D000-memory.dmp
    Filesize

    180KB

  • memory/1928-97-0x0000000000250000-0x000000000027D000-memory.dmp
    Filesize

    180KB

  • memory/1948-91-0x0000000000690000-0x00000000006BD000-memory.dmp
    Filesize

    180KB