Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 18:19
Static task
static1
Behavioral task
behavioral1
Sample
291976ba47cec4b3c0e31cbc50ab1923.exe
Resource
win7-20220812-en
General
-
Target
291976ba47cec4b3c0e31cbc50ab1923.exe
-
Size
236KB
-
MD5
291976ba47cec4b3c0e31cbc50ab1923
-
SHA1
38273b08bd046fc29bd777c9dc4a177ae162b5f8
-
SHA256
a78dbafaca4813307529cafbed554b53a622a639941f2e66520bbb92769ee960
-
SHA512
0b44f02c9d37ba25b9988146bf9a516b65625ed7184c4188689eb4056945cd56e86180e21d7b157faff6acdf4991eec51b18c8d83f084652ef574b0d7ec4158b
-
SSDEEP
3072:1H5VhrQrb6DvbqJMikwRz2Og2QTAxQ4Vt6r+CtbmMjxm8qyCz/xwDSpa:1ZkFkw1vgfCVt6r+l18qjp6Sp
Malware Config
Signatures
-
Detects PlugX payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/756-62-0x0000000000390000-0x00000000003C8000-memory.dmp family_plugx behavioral1/memory/1204-63-0x0000000001CA0000-0x0000000001CD8000-memory.dmp family_plugx behavioral1/memory/1796-72-0x00000000002A0000-0x00000000002D8000-memory.dmp family_plugx behavioral1/memory/524-74-0x00000000001E0000-0x0000000000218000-memory.dmp family_plugx behavioral1/memory/1204-75-0x0000000001CA0000-0x0000000001CD8000-memory.dmp family_plugx behavioral1/memory/1124-80-0x00000000002F0000-0x0000000000328000-memory.dmp family_plugx behavioral1/memory/524-81-0x00000000001E0000-0x0000000000218000-memory.dmp family_plugx behavioral1/memory/1124-82-0x00000000002F0000-0x0000000000328000-memory.dmp family_plugx -
Executes dropped EXE 2 IoCs
Processes:
NvSmart.exeNvSmart.exepid process 1204 NvSmart.exe 1796 NvSmart.exe -
Deletes itself 1 IoCs
Processes:
NvSmart.exepid process 1204 NvSmart.exe -
Loads dropped DLL 2 IoCs
Processes:
NvSmart.exeNvSmart.exepid process 1204 NvSmart.exe 1796 NvSmart.exe -
Modifies data under HKEY_USERS 38 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionReason = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadNetworkName = "Network 2" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionTime = 80eb77a22704d901 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionTime = 20248bb62704d901 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionTime = 80eb77a22704d901 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecision = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionTime = 20248bb62704d901 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionTime = 20d291c52704d901 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionTime = 20d291c52704d901 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionTime = 208098d42704d901 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionReason = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDetectedUrl svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionTime = 20c653a62704d901 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecision = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionTime = 20c653a62704d901 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\3e-81-0a-1e-e7-f5\WpadDecisionTime = 60b160c82704d901 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionTime = 60b160c82704d901 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\3e-81-0a-1e-e7-f5 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{604D5010-F53B-4A09-BF4C-F0145B79D4E6}\WpadDecisionTime = 208098d42704d901 svchost.exe -
Modifies registry class 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 46003200380031003100300041003000330045003200430043003000440042000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exemsiexec.exepid process 524 svchost.exe 524 svchost.exe 524 svchost.exe 524 svchost.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 524 svchost.exe 524 svchost.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 524 svchost.exe 524 svchost.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 524 svchost.exe 524 svchost.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 524 svchost.exe 524 svchost.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 524 svchost.exe 524 svchost.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 524 svchost.exe 524 svchost.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 1124 msiexec.exe 524 svchost.exe 524 svchost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
291976ba47cec4b3c0e31cbc50ab1923.exeNvSmart.exeNvSmart.exesvchost.exemsiexec.exedescription pid process Token: SeDebugPrivilege 756 291976ba47cec4b3c0e31cbc50ab1923.exe Token: SeTcbPrivilege 756 291976ba47cec4b3c0e31cbc50ab1923.exe Token: SeDebugPrivilege 1204 NvSmart.exe Token: SeTcbPrivilege 1204 NvSmart.exe Token: SeDebugPrivilege 1796 NvSmart.exe Token: SeTcbPrivilege 1796 NvSmart.exe Token: SeDebugPrivilege 524 svchost.exe Token: SeTcbPrivilege 524 svchost.exe Token: SeDebugPrivilege 1124 msiexec.exe Token: SeTcbPrivilege 1124 msiexec.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
NvSmart.exesvchost.exedescription pid process target process PID 1796 wrote to memory of 524 1796 NvSmart.exe svchost.exe PID 1796 wrote to memory of 524 1796 NvSmart.exe svchost.exe PID 1796 wrote to memory of 524 1796 NvSmart.exe svchost.exe PID 1796 wrote to memory of 524 1796 NvSmart.exe svchost.exe PID 1796 wrote to memory of 524 1796 NvSmart.exe svchost.exe PID 1796 wrote to memory of 524 1796 NvSmart.exe svchost.exe PID 1796 wrote to memory of 524 1796 NvSmart.exe svchost.exe PID 1796 wrote to memory of 524 1796 NvSmart.exe svchost.exe PID 1796 wrote to memory of 524 1796 NvSmart.exe svchost.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe PID 524 wrote to memory of 1124 524 svchost.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\291976ba47cec4b3c0e31cbc50ab1923.exe"C:\Users\Admin\AppData\Local\Temp\291976ba47cec4b3c0e31cbc50ab1923.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:756
-
C:\ProgramData\SxS\NvSmart.exe"C:\ProgramData\SxS\NvSmart.exe" 100 7561⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
C:\ProgramData\SxS\NvSmart.exe"C:\ProgramData\SxS\NvSmart.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 5243⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
5KB
MD5ff338690b8c399341981dcbcaf3af02c
SHA15162c70b2ae0b434cab7d9871dbd9a1dac14ec45
SHA2565304d00250196a8cd5e9a81e053a886d1a291e4615484e49ff537bebecc13976
SHA5124c4394b9675d0ab01d2fc8d4a765411fb83700ae58d86b4c71452563931cb50ff1ed60ac637099e89bf0d49f939b4c7eaa4e168c1c2baa1b04e8e80fff37e5a3
-
Filesize
460B
MD5ba3e2da162bb39b61506692758d96d2b
SHA17ae15fced78bf4c152b3e8fd5adeaf0697fe7bf7
SHA256756097e9977f3ef67915b840681ece3afea979ad951156480e22c447078a17ad
SHA5121d3a16ac94dcf1f547e111a081f55d54f511dc92322c4c3c358d6cf528bbb7c656f39c57f8234dd9796e089cb409c0f47a65668ea88c33cd38b8d056d7f368c1
-
Filesize
155KB
MD564dce06ff017f3613b3360f3fa2200b6
SHA1df7b71bbc1e40a8a3ef52ba8a744f2572608eb9c
SHA2563b3f5f30ec0ef0a061e322c55e3ab55f095b6bd346ebecf3ba6970180ccf2c93
SHA512f1924ed6f8c430422939c6c37fc1349ecbc81bef4dded66d71facb2246da9dc12dab0a3738d05df4c4cee3bba141eaa0d02fcd17505b2c5eb0fa2e49aec63410
-
Filesize
5KB
MD5ff338690b8c399341981dcbcaf3af02c
SHA15162c70b2ae0b434cab7d9871dbd9a1dac14ec45
SHA2565304d00250196a8cd5e9a81e053a886d1a291e4615484e49ff537bebecc13976
SHA5124c4394b9675d0ab01d2fc8d4a765411fb83700ae58d86b4c71452563931cb50ff1ed60ac637099e89bf0d49f939b4c7eaa4e168c1c2baa1b04e8e80fff37e5a3
-
Filesize
5KB
MD5ff338690b8c399341981dcbcaf3af02c
SHA15162c70b2ae0b434cab7d9871dbd9a1dac14ec45
SHA2565304d00250196a8cd5e9a81e053a886d1a291e4615484e49ff537bebecc13976
SHA5124c4394b9675d0ab01d2fc8d4a765411fb83700ae58d86b4c71452563931cb50ff1ed60ac637099e89bf0d49f939b4c7eaa4e168c1c2baa1b04e8e80fff37e5a3