Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 18:05
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20220901-en
General
-
Target
sample.exe
-
Size
337KB
-
MD5
cd5bc22cd00975467ba470a2aad9e3be
-
SHA1
c59f130dd579e3f7d31a4d8d0f3fa5f269b332f3
-
SHA256
06013460d92bfef5f63085d1d10afb87a417678642b199cdae282395d1b09261
-
SHA512
887e12492751f0bbded9bd665c39a5a28e31d77bc2de0c8ade73b63173352d6e9bc8f9575d966772e39c4b1622aa4d9966e7f873b405eca8f4b2c515ab9b7ac9
-
SSDEEP
6144:+z+92mhAMJ/cPl3ihLcDkcK7TSH6eby0gePbS1hNPnHt6Q+hTnO3pE:+K2mhAMJ/cPlPgcK6bb6KbCL6phi3C
Malware Config
Signatures
-
Detects PlugX payload 1 IoCs
resource yara_rule behavioral1/memory/2020-67-0x0000000000530000-0x0000000000560000-memory.dmp family_plugx -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1264 start.exe 2020 xlmin.exe 824 000045packer.exe -
Loads dropped DLL 13 IoCs
pid Process 832 sample.exe 832 sample.exe 832 sample.exe 832 sample.exe 2020 xlmin.exe 2020 xlmin.exe 1348 WerFault.exe 1348 WerFault.exe 1348 WerFault.exe 1348 WerFault.exe 1348 WerFault.exe 1348 WerFault.exe 1348 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1348 824 WerFault.exe 31 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1264 start.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2020 xlmin.exe Token: SeTcbPrivilege 2020 xlmin.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1264 start.exe 2020 xlmin.exe 2020 xlmin.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2020 xlmin.exe 2020 xlmin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 832 wrote to memory of 1264 832 sample.exe 28 PID 832 wrote to memory of 1264 832 sample.exe 28 PID 832 wrote to memory of 1264 832 sample.exe 28 PID 832 wrote to memory of 1264 832 sample.exe 28 PID 832 wrote to memory of 1264 832 sample.exe 28 PID 832 wrote to memory of 1264 832 sample.exe 28 PID 832 wrote to memory of 1264 832 sample.exe 28 PID 2020 wrote to memory of 824 2020 xlmin.exe 31 PID 2020 wrote to memory of 824 2020 xlmin.exe 31 PID 2020 wrote to memory of 824 2020 xlmin.exe 31 PID 2020 wrote to memory of 824 2020 xlmin.exe 31 PID 824 wrote to memory of 1348 824 000045packer.exe 32 PID 824 wrote to memory of 1348 824 000045packer.exe 32 PID 824 wrote to memory of 1348 824 000045packer.exe 32 PID 824 wrote to memory of 1348 824 000045packer.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\xlmin.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe"C:\Users\Admin\AppData\Roaming\XGMiniDownloader\000045packer.exe" /minidownloader2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 1923⤵
- Loads dropped DLL
- Program crash
PID:1348
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD523ab40494c1f3dc4adcc9566f2e31296
SHA1304fe661f9dd9ca65ca4918bbfc36f1da215d058
SHA2566a229ca2f570a1c28e6a226f1aaa568fc40d89e1028fb97ccd1ad5f9b02ae564
SHA5122130d3ad1c82dcc7f137c887d1b8a5eebf43d116f004819c8bb820345cee61a4a163eb04f310eccac54427c95e8852fa5e92c0edcef87d14171aa64ae97d2e38
-
Filesize
40KB
MD5b3c4f33da415eb7648d71a89312df114
SHA18cac341abda25120b89da085dadee72f17b7b356
SHA256b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9
SHA51203ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
173KB
MD5e76ee3dd4b09116ccb947a2c063cfe0e
SHA16369bb55c284bd373c4be35cdcde36026d8a8a7d
SHA256e8cbf2de0dcd938d74ae3d8f4c17142b5debca17808f7801d55ecc95feadfb3c
SHA512171868e5b33885459504bb9c0c82dbf2b54c2ec656050ab1686328dfa69e2a62b15d1d7278f2682902356fd88a6c13001f7cadbd6f9b7afbc37b2613bf8ce2da
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
40KB
MD5b3c4f33da415eb7648d71a89312df114
SHA18cac341abda25120b89da085dadee72f17b7b356
SHA256b388009ca8311e82e37b4009054ac21350157299d1240a8070b66a177ffdd3f9
SHA51203ea98d2ad918593277c5cede06061ef2446f10e74b3c6bcf512094bff9ead911802fb5d24efba4d95b4579ef5c12dcbe3338b556c0c35d249b2703f82367183
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
41KB
MD52b736720e2c2674b8037a03266574048
SHA1b0fccf6893442467f1c8a7f05783d1f1ea27fa74
SHA25627d22e2fb09e101ec13d9dc16bf743d6a49111c3205ea9127d1733696c3afbe1
SHA51270c6458db107dc7254abc61508f014fe40f11a733d043cc1388113ef2887dcb666656d65a51d61fa65fff25ede393e4a99bf6a9976a895255f5807e57abfad94
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d
-
Filesize
1.8MB
MD5848dc30afe377fdeb82a45539a6ecf62
SHA10d1a038e77b5be899928d2459532edecf329695a
SHA2560ee6fbd8eb2275164accfec12e1e55cecb07dde988df23984fbbf054f2b24c87
SHA512059249e7d19423b85a480a58cbc55998685fb8cc326608f52a53f938863738b0b971ca0d3ca1d4da0ef42271c4fb18c372f8bdb0fef74cbc0939c76f9448b08d