Analysis

  • max time kernel
    152s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2022 23:36

General

  • Target

    03cbf99ae34bd4e53613ec36805e5f9ea7c2ce84011d99fc0dd37a5dcc3e8170.exe

  • Size

    239KB

  • MD5

    69b7c08a2e149ceb4f6ff9bd61f14290

  • SHA1

    0c81051d61536ec14fe193e64bda356a885b63cd

  • SHA256

    03cbf99ae34bd4e53613ec36805e5f9ea7c2ce84011d99fc0dd37a5dcc3e8170

  • SHA512

    ee6076e993a0db2b408077ecbfdcaa69e63e965699bfe8ff0e29005bc081e220ac600b6daf6af1a8a81cc722f990b69cad7483596fc5ffde87b4799a6d7b73e1

  • SSDEEP

    6144:/27gCbTehEqclWYacI5Jg6A0xPl4aX5D8owFSunNQLW3:/27/bTehEqclrt2X44JUSunOLA

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 7 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 31 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03cbf99ae34bd4e53613ec36805e5f9ea7c2ce84011d99fc0dd37a5dcc3e8170.exe
    "C:\Users\Admin\AppData\Local\Temp\03cbf99ae34bd4e53613ec36805e5f9ea7c2ce84011d99fc0dd37a5dcc3e8170.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\NvSmart.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\NvSmart.exe"
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1512
  • C:\Program Files (x86)\Common Files\NvSmart.exe
    "C:\Program Files (x86)\Common Files\NvSmart.exe" 100 1512
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:572
  • C:\Program Files (x86)\Common Files\NvSmart.exe
    "C:\Program Files (x86)\Common Files\NvSmart.exe" 200 0
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 201 0
      2⤵
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\SysWOW64\msiexec.exe
        C:\Windows\system32\msiexec.exe 209 624
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\NvSmart.dat

    Filesize

    120KB

    MD5

    92821c7ab934963e9b04f917d272cefc

    SHA1

    e8c092d9f0858dda6378962f20e44ffc39245f73

    SHA256

    0ebcbb904423910f81d8813852a0b4d73edbcc4d4216d58b723bc130eccbc2d0

    SHA512

    3cccbd7955a5baf3056140bfdef68e7e3e9cd193ae13a9e79074b7913360cb791dc95e9b5cff75227449ed9743dacc6711b12186b20193523915adf79d24c142

  • C:\Program Files (x86)\Common Files\NvSmart.exe

    Filesize

    43KB

    MD5

    4d0c8f09a4e3bd5c063c2c4f100ed8d6

    SHA1

    7f9193357d84761336184851ac06464efd41a09b

    SHA256

    35ca38b9b7292b8c9da598ce5f2baafb76b90b66ddac366a43c77cbdf984801d

    SHA512

    4fa141785dba9aabb01ce563f1e2d4b1e96b75a8eefd44814160520de0c3da9c084e65e494fe3566db9c1094aad46efe8b4b546236432b582c4724542f210b21

  • C:\Program Files (x86)\Common Files\NvSmart.exe

    Filesize

    43KB

    MD5

    4d0c8f09a4e3bd5c063c2c4f100ed8d6

    SHA1

    7f9193357d84761336184851ac06464efd41a09b

    SHA256

    35ca38b9b7292b8c9da598ce5f2baafb76b90b66ddac366a43c77cbdf984801d

    SHA512

    4fa141785dba9aabb01ce563f1e2d4b1e96b75a8eefd44814160520de0c3da9c084e65e494fe3566db9c1094aad46efe8b4b546236432b582c4724542f210b21

  • C:\Program Files (x86)\Common Files\NvSmartMax.dll

    Filesize

    11KB

    MD5

    1fab1cd41b73e9a485c4237307c72d24

    SHA1

    f48a4e1cafbf00c33221c605dc2f843dba74f903

    SHA256

    c164b75b738f3d85c27016b4cc9515d8dd5d12f16175e31fac2b13c5c2737fef

    SHA512

    70dd3d214dd2871364253775a404c35ae91db388108e8577d49de368a93f15ce542aa1c5408e1b4640371999d09e186741a911ed39f044320fd7ee04b7eeab85

  • C:\ProgramData\SxS\bug.log

    Filesize

    460B

    MD5

    c6e829fd3b2baa32f2958ff9529615bf

    SHA1

    da5641c539c253dafc6a072bf5c0022c158b3168

    SHA256

    84db1d295895afef9671f8c981896c4e373eceaec2985a67a0b53b8af476fde3

    SHA512

    afe6dac026f4b2b9b967b11ac191058b6f0e2bac97524300bb90fa9c3ec9293f492f81d8ce9ae1c2c290e6e7312d353dd3e58c129d6f79c18184ca56bbfe427a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\NvSmart.dat

    Filesize

    120KB

    MD5

    92821c7ab934963e9b04f917d272cefc

    SHA1

    e8c092d9f0858dda6378962f20e44ffc39245f73

    SHA256

    0ebcbb904423910f81d8813852a0b4d73edbcc4d4216d58b723bc130eccbc2d0

    SHA512

    3cccbd7955a5baf3056140bfdef68e7e3e9cd193ae13a9e79074b7913360cb791dc95e9b5cff75227449ed9743dacc6711b12186b20193523915adf79d24c142

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\NvSmart.exe

    Filesize

    43KB

    MD5

    4d0c8f09a4e3bd5c063c2c4f100ed8d6

    SHA1

    7f9193357d84761336184851ac06464efd41a09b

    SHA256

    35ca38b9b7292b8c9da598ce5f2baafb76b90b66ddac366a43c77cbdf984801d

    SHA512

    4fa141785dba9aabb01ce563f1e2d4b1e96b75a8eefd44814160520de0c3da9c084e65e494fe3566db9c1094aad46efe8b4b546236432b582c4724542f210b21

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\NvSmart.exe

    Filesize

    43KB

    MD5

    4d0c8f09a4e3bd5c063c2c4f100ed8d6

    SHA1

    7f9193357d84761336184851ac06464efd41a09b

    SHA256

    35ca38b9b7292b8c9da598ce5f2baafb76b90b66ddac366a43c77cbdf984801d

    SHA512

    4fa141785dba9aabb01ce563f1e2d4b1e96b75a8eefd44814160520de0c3da9c084e65e494fe3566db9c1094aad46efe8b4b546236432b582c4724542f210b21

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\NvSmartMax.dll

    Filesize

    11KB

    MD5

    1fab1cd41b73e9a485c4237307c72d24

    SHA1

    f48a4e1cafbf00c33221c605dc2f843dba74f903

    SHA256

    c164b75b738f3d85c27016b4cc9515d8dd5d12f16175e31fac2b13c5c2737fef

    SHA512

    70dd3d214dd2871364253775a404c35ae91db388108e8577d49de368a93f15ce542aa1c5408e1b4640371999d09e186741a911ed39f044320fd7ee04b7eeab85

  • \Program Files (x86)\Common Files\NvSmartMax.dll

    Filesize

    11KB

    MD5

    1fab1cd41b73e9a485c4237307c72d24

    SHA1

    f48a4e1cafbf00c33221c605dc2f843dba74f903

    SHA256

    c164b75b738f3d85c27016b4cc9515d8dd5d12f16175e31fac2b13c5c2737fef

    SHA512

    70dd3d214dd2871364253775a404c35ae91db388108e8577d49de368a93f15ce542aa1c5408e1b4640371999d09e186741a911ed39f044320fd7ee04b7eeab85

  • \Program Files (x86)\Common Files\NvSmartMax.dll

    Filesize

    11KB

    MD5

    1fab1cd41b73e9a485c4237307c72d24

    SHA1

    f48a4e1cafbf00c33221c605dc2f843dba74f903

    SHA256

    c164b75b738f3d85c27016b4cc9515d8dd5d12f16175e31fac2b13c5c2737fef

    SHA512

    70dd3d214dd2871364253775a404c35ae91db388108e8577d49de368a93f15ce542aa1c5408e1b4640371999d09e186741a911ed39f044320fd7ee04b7eeab85

  • \Users\Admin\AppData\Local\Temp\RarSFX0\NvSmart.exe

    Filesize

    43KB

    MD5

    4d0c8f09a4e3bd5c063c2c4f100ed8d6

    SHA1

    7f9193357d84761336184851ac06464efd41a09b

    SHA256

    35ca38b9b7292b8c9da598ce5f2baafb76b90b66ddac366a43c77cbdf984801d

    SHA512

    4fa141785dba9aabb01ce563f1e2d4b1e96b75a8eefd44814160520de0c3da9c084e65e494fe3566db9c1094aad46efe8b4b546236432b582c4724542f210b21

  • \Users\Admin\AppData\Local\Temp\RarSFX0\NvSmart.exe

    Filesize

    43KB

    MD5

    4d0c8f09a4e3bd5c063c2c4f100ed8d6

    SHA1

    7f9193357d84761336184851ac06464efd41a09b

    SHA256

    35ca38b9b7292b8c9da598ce5f2baafb76b90b66ddac366a43c77cbdf984801d

    SHA512

    4fa141785dba9aabb01ce563f1e2d4b1e96b75a8eefd44814160520de0c3da9c084e65e494fe3566db9c1094aad46efe8b4b546236432b582c4724542f210b21

  • \Users\Admin\AppData\Local\Temp\RarSFX0\NvSmartMax.dll

    Filesize

    11KB

    MD5

    1fab1cd41b73e9a485c4237307c72d24

    SHA1

    f48a4e1cafbf00c33221c605dc2f843dba74f903

    SHA256

    c164b75b738f3d85c27016b4cc9515d8dd5d12f16175e31fac2b13c5c2737fef

    SHA512

    70dd3d214dd2871364253775a404c35ae91db388108e8577d49de368a93f15ce542aa1c5408e1b4640371999d09e186741a911ed39f044320fd7ee04b7eeab85

  • memory/572-82-0x0000000000410000-0x0000000000440000-memory.dmp

    Filesize

    192KB

  • memory/624-89-0x0000000000210000-0x0000000000240000-memory.dmp

    Filesize

    192KB

  • memory/624-83-0x0000000000210000-0x0000000000240000-memory.dmp

    Filesize

    192KB

  • memory/624-76-0x00000000000A0000-0x00000000000BD000-memory.dmp

    Filesize

    116KB

  • memory/624-78-0x0000000000000000-mapping.dmp

  • memory/932-80-0x0000000000320000-0x0000000000350000-memory.dmp

    Filesize

    192KB

  • memory/1512-57-0x0000000000000000-mapping.dmp

  • memory/1512-64-0x00000000002A0000-0x00000000002D0000-memory.dmp

    Filesize

    192KB

  • memory/1512-63-0x00000000002F0000-0x00000000003F0000-memory.dmp

    Filesize

    1024KB

  • memory/1524-86-0x0000000000000000-mapping.dmp

  • memory/1524-88-0x0000000000250000-0x0000000000280000-memory.dmp

    Filesize

    192KB

  • memory/1524-90-0x0000000000250000-0x0000000000280000-memory.dmp

    Filesize

    192KB

  • memory/1996-54-0x0000000076171000-0x0000000076173000-memory.dmp

    Filesize

    8KB