Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 17:37

General

  • Target

    58704564529d35facea850f67d6af8a8a3150acc0f86e578660157bc2e2bd8df.exe

  • Size

    337KB

  • MD5

    8f4b62ca3f67913f70263dcb2006bc33

  • SHA1

    c1962b906b2218a7965f48e943c2e2ccf16f9632

  • SHA256

    58704564529d35facea850f67d6af8a8a3150acc0f86e578660157bc2e2bd8df

  • SHA512

    2b13a3bd3b8748cb458878b7632814a2638ed5d079107782e09a2d7544e21944d0ef75b479246d04aeab6c802ab266724f784e2524340a5eed622764b6df8eda

Score
10/10

Malware Config

Signatures

  • Detects PlugX Payload 6 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • suricata: ET MALWARE Trojan.Win32.DLOADR.TIOIBEPQ CnC Traffic

    suricata: ET MALWARE Trojan.Win32.DLOADR.TIOIBEPQ CnC Traffic

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 34 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58704564529d35facea850f67d6af8a8a3150acc0f86e578660157bc2e2bd8df.exe
    "C:\Users\Admin\AppData\Local\Temp\58704564529d35facea850f67d6af8a8a3150acc0f86e578660157bc2e2bd8df.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:932
  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe
    "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1684
  • C:\ProgramData\360\xlmin.exe
    C:\ProgramData\360\xlmin.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 201 0
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Windows\SysWOW64\msiexec.exe
        C:\Windows\system32\msiexec.exe 209 780
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\360\dl_peer_id.db

    Filesize

    120KB

    MD5

    b763906f3d2436e66b6f1b4878814810

    SHA1

    c80a1e1f700bf2128c01bf71df7ca14196450e81

    SHA256

    0fee44e19fbf492e2d3c5df88f2d127ff6af6c7f347613aa64b9409b5af65b50

    SHA512

    c28489a04bd849eeb0b5ed9ad9adcb271f142e6679e50d40720bfca10594e0d097e77b79c6b0307ae39281edcc434f1b1102f9e91fa86946185e1bfdaf1d5ced

  • C:\ProgramData\360\dl_peer_id.dll

    Filesize

    40KB

    MD5

    b3c4f33da415eb7648d71a89312df114

    SHA1

    8cac341abda25120b89da085dadee72f17b7b356

    SHA256

    b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9

    SHA512

    03ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183

  • C:\ProgramData\360\xlmin.exe

    Filesize

    173KB

    MD5

    e76ee3dd4b09116ccb947a2c063cfe0e

    SHA1

    6369bb55c284bd373c4be35cdcde36026d8a8a7d

    SHA256

    e8cbf2de0dcd938d74ae3d8f4c17142b5debca17808f7801d55ecc95feadfb3c

    SHA512

    171868e5b33885459504bb9c0c82dbf2b54c2ec656050ab1686328dfa69e2a62b15d1d7278f2682902356fd88a6c13001f7cadbd6f9b7afbc37b2613bf8ce2da

  • C:\ProgramData\SxS\bug.log

    Filesize

    456B

    MD5

    c4241784be20e56c1369948a0cb74d9c

    SHA1

    32133fbd01620262cbd0857a1509ce14e7210151

    SHA256

    3c74e5a3ad84db34d1b87872a10b924727d8d98749a2e18051434cc03294be17

    SHA512

    cf3c83d697430199bc0175e177340bbaeacd6acec6b1ddb7d2f40ed96741c1d51889968c9e5cc701e738809c5a5295a6aec97c868a45f497fb30af69c7a18f37

  • C:\ProgramData\SxS\bug.log

    Filesize

    618B

    MD5

    84b04013bc02912997441c3da137c2e8

    SHA1

    b288bcf809847658d5ddba43268ecd9e1fbb72d1

    SHA256

    39050e02131bac4f04e9e5f2b1e203a3fa3f82dafd2fae749e9c88a767be92a1

    SHA512

    bbfba9af9c5656cdf959e9171a126d5e13f80c30071a544eab182c3d8ee008c448fd210a4b7a6154cfe535adf29689b73a58989895e04e94087e3c0e46d29a2b

  • C:\ProgramData\SxS\bug.log

    Filesize

    760B

    MD5

    cedbbd66e71acb63aa6160fc8f081f98

    SHA1

    d69480b89d713b915c44f721f784a769bc43a963

    SHA256

    ce7ffedc46e90ab20184516ab883e69ed1d62574b50b1aeb67078b5f0c2dfda1

    SHA512

    76a1578aa15134562a1390d5bb933dd75492073a3d39d3d8d58dfdde42b5174b738dc03cafd2f8be7f77343c4bac2d3ffb3204a19ccfcd09b78bf4be562ca64e

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dl_peer_id.db

    Filesize

    120KB

    MD5

    b763906f3d2436e66b6f1b4878814810

    SHA1

    c80a1e1f700bf2128c01bf71df7ca14196450e81

    SHA256

    0fee44e19fbf492e2d3c5df88f2d127ff6af6c7f347613aa64b9409b5af65b50

    SHA512

    c28489a04bd849eeb0b5ed9ad9adcb271f142e6679e50d40720bfca10594e0d097e77b79c6b0307ae39281edcc434f1b1102f9e91fa86946185e1bfdaf1d5ced

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dl_peer_id.dll

    Filesize

    40KB

    MD5

    b3c4f33da415eb7648d71a89312df114

    SHA1

    8cac341abda25120b89da085dadee72f17b7b356

    SHA256

    b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9

    SHA512

    03ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe

    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe

    Filesize

    173KB

    MD5

    e76ee3dd4b09116ccb947a2c063cfe0e

    SHA1

    6369bb55c284bd373c4be35cdcde36026d8a8a7d

    SHA256

    e8cbf2de0dcd938d74ae3d8f4c17142b5debca17808f7801d55ecc95feadfb3c

    SHA512

    171868e5b33885459504bb9c0c82dbf2b54c2ec656050ab1686328dfa69e2a62b15d1d7278f2682902356fd88a6c13001f7cadbd6f9b7afbc37b2613bf8ce2da

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe

    Filesize

    173KB

    MD5

    e76ee3dd4b09116ccb947a2c063cfe0e

    SHA1

    6369bb55c284bd373c4be35cdcde36026d8a8a7d

    SHA256

    e8cbf2de0dcd938d74ae3d8f4c17142b5debca17808f7801d55ecc95feadfb3c

    SHA512

    171868e5b33885459504bb9c0c82dbf2b54c2ec656050ab1686328dfa69e2a62b15d1d7278f2682902356fd88a6c13001f7cadbd6f9b7afbc37b2613bf8ce2da

  • \ProgramData\360\dl_peer_id.dll

    Filesize

    40KB

    MD5

    b3c4f33da415eb7648d71a89312df114

    SHA1

    8cac341abda25120b89da085dadee72f17b7b356

    SHA256

    b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9

    SHA512

    03ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183

  • \Users\Admin\AppData\Local\Temp\RarSFX0\dl_peer_id.dll

    Filesize

    40KB

    MD5

    b3c4f33da415eb7648d71a89312df114

    SHA1

    8cac341abda25120b89da085dadee72f17b7b356

    SHA256

    b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9

    SHA512

    03ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183

  • \Users\Admin\AppData\Local\Temp\RarSFX0\start.exe

    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • \Users\Admin\AppData\Local\Temp\RarSFX0\start.exe

    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • \Users\Admin\AppData\Local\Temp\RarSFX0\start.exe

    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • \Users\Admin\AppData\Local\Temp\RarSFX0\start.exe

    Filesize

    41KB

    MD5

    2b736720e2c2674b8037a03266574048

    SHA1

    b0fccf6893442467f1c8a7f05783d1f1ea27fa74

    SHA256

    27d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1

    SHA512

    70c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94

  • memory/540-78-0x00000000020E0000-0x0000000002110000-memory.dmp

    Filesize

    192KB

  • memory/780-79-0x0000000000380000-0x00000000003B0000-memory.dmp

    Filesize

    192KB

  • memory/780-74-0x00000000000A0000-0x00000000000BD000-memory.dmp

    Filesize

    116KB

  • memory/780-87-0x0000000000380000-0x00000000003B0000-memory.dmp

    Filesize

    192KB

  • memory/952-86-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/952-88-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1684-67-0x0000000000530000-0x0000000000560000-memory.dmp

    Filesize

    192KB

  • memory/2024-54-0x0000000075381000-0x0000000075383000-memory.dmp

    Filesize

    8KB