Analysis

  • max time kernel
    45s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 17:36

General

  • Target

    708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe

  • Size

    337KB

  • MD5

    080c67f64e13037cddc7e77a54ac5962

  • SHA1

    cf1d592941bf7de40e8e4f9defd650872ba72078

  • SHA256

    708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8

  • SHA512

    7a8c5e8dbd7e298f9c4e43417b042cae4b5aed329430d2f33a32b703f302ab34930787f8f512e60e252f1e57fd637bb1819d31437eeea5abc72abeb36f7cdbac

Score
10/10

Malware Config

Signatures

  • Detects PlugX Payload 1 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe
    "C:\Users\Admin\AppData\Local\Temp\708aad026b71a61f94281fe290af3013de594a5bab928537713370ce0ce341f8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:1100
  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe
    "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
      "C:\Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe" /minidownloader
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 192
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:632

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dl_peer_id.db
    Filesize

    120KB

    MD5

    eed20c07bb46b74b8efd5ea35225e0f9

    SHA1

    8d113ba9abba0303d64f99e714186b074e034dc3

    SHA256

    c95c95742ff37e248683ca467d46adea11de6b6ea46bd74af79e3eb93911d505

    SHA512

    a334f062eb998d5f1d88c9114a81aaecd3d3fff6115a746cd75be5379f59dc5c9243ce705580ac67ecb190554595ae0f13c7685be7ab8bd882002e1795cdc1b8

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dl_peer_id.dll
    Filesize

    40KB

    MD5

    b3c4f33da415eb7648d71a89312df114

    SHA1

    8cac341abda25120b89da085dadee72f17b7b356

    SHA256

    b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9

    SHA512

    03ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe
    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe
    Filesize

    173KB

    MD5

    e76ee3dd4b09116ccb947a2c063cfe0e

    SHA1

    6369bb55c284bd373c4be35cdcde36026d8a8a7d

    SHA256

    e8cbf2de0dcd938d74ae3d8f4c17142b5debca17808f7801d55ecc95feadfb3c

    SHA512

    171868e5b33885459504bb9c0c82dbf2b54c2ec656050ab1686328dfa69e2a62b15d1d7278f2682902356fd88a6c13001f7cadbd6f9b7afbc37b2613bf8ce2da

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe
    Filesize

    173KB

    MD5

    e76ee3dd4b09116ccb947a2c063cfe0e

    SHA1

    6369bb55c284bd373c4be35cdcde36026d8a8a7d

    SHA256

    e8cbf2de0dcd938d74ae3d8f4c17142b5debca17808f7801d55ecc95feadfb3c

    SHA512

    171868e5b33885459504bb9c0c82dbf2b54c2ec656050ab1686328dfa69e2a62b15d1d7278f2682902356fd88a6c13001f7cadbd6f9b7afbc37b2613bf8ce2da

  • C:\Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
    Filesize

    1.8MB

    MD5

    848dc30afe377fdeb82a45539a6ecf62

    SHA1

    0d1a038e77b5be899928d2459532edecf329695a

    SHA256

    0ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87

    SHA512

    059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d

  • \Users\Admin\AppData\Local\Temp\RarSFX0\dl_peer_id.dll
    Filesize

    40KB

    MD5

    b3c4f33da415eb7648d71a89312df114

    SHA1

    8cac341abda25120b89da085dadee72f17b7b356

    SHA256

    b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9

    SHA512

    03ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183

  • \Users\Admin\AppData\Local\Temp\RarSFX0\start.exe
    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • \Users\Admin\AppData\Local\Temp\RarSFX0\start.exe
    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • \Users\Admin\AppData\Local\Temp\RarSFX0\start.exe
    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • \Users\Admin\AppData\Local\Temp\RarSFX0\start.exe
    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • \Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
    Filesize

    1.8MB

    MD5

    848dc30afe377fdeb82a45539a6ecf62

    SHA1

    0d1a038e77b5be899928d2459532edecf329695a

    SHA256

    0ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87

    SHA512

    059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d

  • \Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
    Filesize

    1.8MB

    MD5

    848dc30afe377fdeb82a45539a6ecf62

    SHA1

    0d1a038e77b5be899928d2459532edecf329695a

    SHA256

    0ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87

    SHA512

    059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d

  • \Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
    Filesize

    1.8MB

    MD5

    848dc30afe377fdeb82a45539a6ecf62

    SHA1

    0d1a038e77b5be899928d2459532edecf329695a

    SHA256

    0ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87

    SHA512

    059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d

  • \Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
    Filesize

    1.8MB

    MD5

    848dc30afe377fdeb82a45539a6ecf62

    SHA1

    0d1a038e77b5be899928d2459532edecf329695a

    SHA256

    0ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87

    SHA512

    059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d

  • \Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
    Filesize

    1.8MB

    MD5

    848dc30afe377fdeb82a45539a6ecf62

    SHA1

    0d1a038e77b5be899928d2459532edecf329695a

    SHA256

    0ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87

    SHA512

    059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d

  • \Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
    Filesize

    1.8MB

    MD5

    848dc30afe377fdeb82a45539a6ecf62

    SHA1

    0d1a038e77b5be899928d2459532edecf329695a

    SHA256

    0ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87

    SHA512

    059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d

  • \Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
    Filesize

    1.8MB

    MD5

    848dc30afe377fdeb82a45539a6ecf62

    SHA1

    0d1a038e77b5be899928d2459532edecf329695a

    SHA256

    0ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87

    SHA512

    059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d

  • \Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe
    Filesize

    1.8MB

    MD5

    848dc30afe377fdeb82a45539a6ecf62

    SHA1

    0d1a038e77b5be899928d2459532edecf329695a

    SHA256

    0ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87

    SHA512

    059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d

  • memory/632-73-0x0000000000000000-mapping.dmp
  • memory/868-54-0x0000000075C51000-0x0000000075C53000-memory.dmp
    Filesize

    8KB

  • memory/1100-59-0x0000000000000000-mapping.dmp
  • memory/1924-70-0x0000000000000000-mapping.dmp
  • memory/2028-67-0x0000000000510000-0x0000000000540000-memory.dmp
    Filesize

    192KB