Analysis
-
max time kernel
45s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 17:36
Static task
static1
Behavioral task
behavioral1
Sample
708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe
Resource
win10v2004-20220414-en
General
-
Target
708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe
-
Size
337KB
-
MD5
080c67f64e13037cddc7e77a54ac5962
-
SHA1
cf1d592941bf7de40e8e4f9defd650872ba72078
-
SHA256
708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8
-
SHA512
7a8c5e8dbd7e298f9c4e43417b042cae4b5aed329430d2f33a32b703f302ab34930787f8f512e60e252f1e57fd637bb1819d31437eeea5abc72abeb36f7cdbac
Malware Config
Signatures
-
Detects PlugX Payload 1 IoCs
resource yara_rule behavioral1/memory/2028-67-0x0000000000510000-0x0000000000540000-memory.dmp family_plugx -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1100 start.exe 2028 xlmin.exe 1924 000045packer.exe -
Loads dropped DLL 13 IoCs
pid Process 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 2028 xlmin.exe 2028 xlmin.exe 632 WerFault.exe 632 WerFault.exe 632 WerFault.exe 632 WerFault.exe 632 WerFault.exe 632 WerFault.exe 632 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 632 1924 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1100 start.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2028 xlmin.exe Token: SeTcbPrivilege 2028 xlmin.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1100 start.exe 2028 xlmin.exe 2028 xlmin.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2028 xlmin.exe 2028 xlmin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 868 wrote to memory of 1100 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 28 PID 868 wrote to memory of 1100 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 28 PID 868 wrote to memory of 1100 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 28 PID 868 wrote to memory of 1100 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 28 PID 868 wrote to memory of 1100 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 28 PID 868 wrote to memory of 1100 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 28 PID 868 wrote to memory of 1100 868 708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe 28 PID 2028 wrote to memory of 1924 2028 xlmin.exe 31 PID 2028 wrote to memory of 1924 2028 xlmin.exe 31 PID 2028 wrote to memory of 1924 2028 xlmin.exe 31 PID 2028 wrote to memory of 1924 2028 xlmin.exe 31 PID 1924 wrote to memory of 632 1924 000045packer.exe 32 PID 1924 wrote to memory of 632 1924 000045packer.exe 32 PID 1924 wrote to memory of 632 1924 000045packer.exe 32 PID 1924 wrote to memory of 632 1924 000045packer.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe"C:\Users\Admin\AppData\Local\Temp\708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe"C:\Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe" /minidownloader2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 1923⤵
- Loads dropped DLL
- Program crash
PID:632
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5eed20c07bb46b74b8efd5ea35225e0f9
SHA18d113ba9abba0303d64f99e714186b074e034dc3
SHA256c95c95742ff37e248683ca467d46adea11de6b6ea46bd74af79e3eb93911d505
SHA512a334f062eb998d5f1d88c9114a81aaecd3d3fff6115a746cd75be5379f59dc5c9243ce705580ac67ecb190554595ae0f13c7685be7ab8bd882002e1795cdc1b8
-
Filesize
40KB
MD5b3c4f33da415eb7648d71a89312df114
SHA18cac341abda25120b89da085dadee72f17b7b356
SHA256b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9
SHA51203ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
173KB
MD5e76ee3dd4b09116ccb947a2c063cfe0e
SHA16369bb55c284bd373c4be35cdcde36026d8a8a7d
SHA256e8cbf2de0dcd938d74ae3d8f4c17142b5debca17808f7801d55ecc95feadfb3c
SHA512171868e5b33885459504bb9c0c82dbf2b54c2ec656050ab1686328dfa69e2a62b15d1d7278f2682902356fd88a6c13001f7cadbd6f9b7afbc37b2613bf8ce2da
-
Filesize
173KB
MD5e76ee3dd4b09116ccb947a2c063cfe0e
SHA16369bb55c284bd373c4be35cdcde36026d8a8a7d
SHA256e8cbf2de0dcd938d74ae3d8f4c17142b5debca17808f7801d55ecc95feadfb3c
SHA512171868e5b33885459504bb9c0c82dbf2b54c2ec656050ab1686328dfa69e2a62b15d1d7278f2682902356fd88a6c13001f7cadbd6f9b7afbc37b2613bf8ce2da
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
40KB
MD5b3c4f33da415eb7648d71a89312df114
SHA18cac341abda25120b89da085dadee72f17b7b356
SHA256b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9
SHA51203ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d