Analysis
-
max time kernel
61s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 23:54
Static task
static1
Behavioral task
behavioral1
Sample
a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe
Resource
win7-20221111-en
General
-
Target
a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe
-
Size
347KB
-
MD5
e733988f97ffcd7bddae53cd194ddb56
-
SHA1
203d4f753ac159cbaa0637726cc2849483fdee23
-
SHA256
a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b
-
SHA512
1c436714ecbd77bd36f628d5d9d6ae0f0869dc77422bd871667f577c8b4200d62991099cbfbf4100717ae9a2bc9b812b6f4fe76329b846df3724a865fc2396e8
-
SSDEEP
6144:v4lRkAehaKuqT+FdR4U5LUskSB4fpweOLPtfuRK6UcdIAfUvPIHTRmon36Z:vkWAehJuqT4SPskbBHClfuRycdIpvPwC
Malware Config
Signatures
-
Detects PlugX payload 6 IoCs
resource yara_rule behavioral1/memory/1000-71-0x00000000003A0000-0x00000000003D0000-memory.dmp family_plugx behavioral1/memory/1176-81-0x00000000001E0000-0x0000000000210000-memory.dmp family_plugx behavioral1/memory/1344-90-0x0000000000190000-0x00000000001C0000-memory.dmp family_plugx behavioral1/memory/1624-92-0x00000000001F0000-0x0000000000220000-memory.dmp family_plugx behavioral1/memory/1176-93-0x00000000001E0000-0x0000000000210000-memory.dmp family_plugx behavioral1/memory/1624-94-0x00000000001F0000-0x0000000000220000-memory.dmp family_plugx -
Executes dropped EXE 4 IoCs
pid Process 936 svchost.exe 1000 MSIDB.exe 1176 MSIDB.exe 1344 MSIDB.exe -
Loads dropped DLL 9 IoCs
pid Process 1668 a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 936 svchost.exe 1000 MSIDB.exe 1000 MSIDB.exe 1176 MSIDB.exe 1344 MSIDB.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 39003200320044004300460046003900410039003400330033003600420035000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1000 MSIDB.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe 1624 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1000 MSIDB.exe Token: SeTcbPrivilege 1000 MSIDB.exe Token: SeDebugPrivilege 1176 MSIDB.exe Token: SeTcbPrivilege 1176 MSIDB.exe Token: SeDebugPrivilege 1344 MSIDB.exe Token: SeTcbPrivilege 1344 MSIDB.exe Token: SeDebugPrivilege 1624 svchost.exe Token: SeTcbPrivilege 1624 svchost.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1668 wrote to memory of 936 1668 a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe 28 PID 1668 wrote to memory of 936 1668 a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe 28 PID 1668 wrote to memory of 936 1668 a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe 28 PID 1668 wrote to memory of 936 1668 a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe 28 PID 1668 wrote to memory of 936 1668 a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe 28 PID 1668 wrote to memory of 936 1668 a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe 28 PID 1668 wrote to memory of 936 1668 a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe 28 PID 936 wrote to memory of 1000 936 svchost.exe 29 PID 936 wrote to memory of 1000 936 svchost.exe 29 PID 936 wrote to memory of 1000 936 svchost.exe 29 PID 936 wrote to memory of 1000 936 svchost.exe 29 PID 936 wrote to memory of 1000 936 svchost.exe 29 PID 936 wrote to memory of 1000 936 svchost.exe 29 PID 936 wrote to memory of 1000 936 svchost.exe 29 PID 1000 wrote to memory of 1176 1000 MSIDB.exe 30 PID 1000 wrote to memory of 1176 1000 MSIDB.exe 30 PID 1000 wrote to memory of 1176 1000 MSIDB.exe 30 PID 1000 wrote to memory of 1176 1000 MSIDB.exe 30 PID 1000 wrote to memory of 1176 1000 MSIDB.exe 30 PID 1000 wrote to memory of 1176 1000 MSIDB.exe 30 PID 1000 wrote to memory of 1176 1000 MSIDB.exe 30 PID 1344 wrote to memory of 1624 1344 MSIDB.exe 32 PID 1344 wrote to memory of 1624 1344 MSIDB.exe 32 PID 1344 wrote to memory of 1624 1344 MSIDB.exe 32 PID 1344 wrote to memory of 1624 1344 MSIDB.exe 32 PID 1344 wrote to memory of 1624 1344 MSIDB.exe 32 PID 1344 wrote to memory of 1624 1344 MSIDB.exe 32 PID 1344 wrote to memory of 1624 1344 MSIDB.exe 32 PID 1344 wrote to memory of 1624 1344 MSIDB.exe 32 PID 1344 wrote to memory of 1624 1344 MSIDB.exe 32 PID 1624 wrote to memory of 1236 1624 svchost.exe 34 PID 1624 wrote to memory of 1236 1624 svchost.exe 34 PID 1624 wrote to memory of 1236 1624 svchost.exe 34 PID 1624 wrote to memory of 1236 1624 svchost.exe 34 PID 1624 wrote to memory of 1236 1624 svchost.exe 34 PID 1624 wrote to memory of 1236 1624 svchost.exe 34 PID 1624 wrote to memory of 1236 1624 svchost.exe 34 PID 1624 wrote to memory of 1236 1624 svchost.exe 34 PID 1624 wrote to memory of 1236 1624 svchost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe"C:\Users\Admin\AppData\Local\Temp\a97959fee0a1ea94a23fa46faed2d786ebfc7db2e1401e843ee36d7e26f7bd7b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\ProgramData\svchost.exe"C:\ProgramData\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSIDB.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\MSIDB.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\ProgramData\Wins\MSIDB.exe"C:\ProgramData\Wins\MSIDB.exe" 100 10004⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
-
-
C:\ProgramData\Wins\MSIDB.exe"C:\ProgramData\Wins\MSIDB.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 16243⤵PID:1236
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
622B
MD59947b6505b15dae2c9371a0ff0f0a821
SHA124313cde9157179d4ac8eeee3bd8a8ec770299fb
SHA256467471a38159c118ac167742d86d5a683474e395cdc4fd18b3071663588f8b8a
SHA512531afaec55af85daee0099e2664215255c1d77807099321bb49a12921a512938728a86eaf393f875733810c6d8a07ca6ec8c74b50c660160e34eebbb7df49dd7
-
Filesize
152KB
MD5211494b619971b7fa34c456116a70adb
SHA10da44929534dc7104f8b661280586f4021bbb896
SHA256cdfbbfdc781d0568dc2466bfbfa8d3ae8f84f80047d1a57f14a967c5dc8be4f4
SHA51213f785a01ed64d7abad41aafc124ae725a7d08318a6b77a0da1dda40a3eaa7c03010b739b480789fae29b7faa8ab251d76cd0e733690d4471bdf7bcf2aa1fd0d
-
Filesize
152KB
MD5211494b619971b7fa34c456116a70adb
SHA10da44929534dc7104f8b661280586f4021bbb896
SHA256cdfbbfdc781d0568dc2466bfbfa8d3ae8f84f80047d1a57f14a967c5dc8be4f4
SHA51213f785a01ed64d7abad41aafc124ae725a7d08318a6b77a0da1dda40a3eaa7c03010b739b480789fae29b7faa8ab251d76cd0e733690d4471bdf7bcf2aa1fd0d
-
Filesize
45KB
MD503d6a61a54eca4d39f4e786315366d18
SHA1fc1b6fa613af321bd66bddd02707c9a7926bca36
SHA2560efc9e2fb1508176de73e32cf8dc85efb4cfb4d7cf15f4468163239b03a0d8a2
SHA512efcf4a20fbfaf75e4d8b02cdb9c58316ea377736d57d0a28d672d052a982ce2984db3ae64d14aab599a6f0542904a1b710ed0091c6b8d29ce31f6fc7b41d1767
-
Filesize
120KB
MD555d8e04cd7ab9acd1117cb3ce3504c08
SHA1d487375b9f45b592d283a45d380c7a5d0beaca2b
SHA256726d05611e84adc80f3ffb3a8a703e359c1bf9d198448e108e6ce3e5a13f0489
SHA512c104b93709649d88d5a03d0ce678657895ad1294263c869bc1a2a38f1f24fa167fc41eed4e4ff0517b811c069ec35f7fe1efdd6179f6be9e1f6ef33d48f02521
-
Filesize
289KB
MD53b6a24fece46501f1ae9e7a366c57906
SHA17bb323f9f013d9d300596d29c5bc291f2328bfd7
SHA2566f7ea82f4aca28beb614e4a452136a85a8f17ef72fc58730a201efd9d75f0d21
SHA512dae718b2ad5d1781d57fae0396e97805c29603eb19ea7124a4925b8150a5a4e4f6d6c68b5d46cce67eb50fcf43f97c44acf4fdcc9ab11aabf79ad866d443afd8
-
Filesize
289KB
MD53b6a24fece46501f1ae9e7a366c57906
SHA17bb323f9f013d9d300596d29c5bc291f2328bfd7
SHA2566f7ea82f4aca28beb614e4a452136a85a8f17ef72fc58730a201efd9d75f0d21
SHA512dae718b2ad5d1781d57fae0396e97805c29603eb19ea7124a4925b8150a5a4e4f6d6c68b5d46cce67eb50fcf43f97c44acf4fdcc9ab11aabf79ad866d443afd8
-
Filesize
152KB
MD5211494b619971b7fa34c456116a70adb
SHA10da44929534dc7104f8b661280586f4021bbb896
SHA256cdfbbfdc781d0568dc2466bfbfa8d3ae8f84f80047d1a57f14a967c5dc8be4f4
SHA51213f785a01ed64d7abad41aafc124ae725a7d08318a6b77a0da1dda40a3eaa7c03010b739b480789fae29b7faa8ab251d76cd0e733690d4471bdf7bcf2aa1fd0d
-
Filesize
152KB
MD5211494b619971b7fa34c456116a70adb
SHA10da44929534dc7104f8b661280586f4021bbb896
SHA256cdfbbfdc781d0568dc2466bfbfa8d3ae8f84f80047d1a57f14a967c5dc8be4f4
SHA51213f785a01ed64d7abad41aafc124ae725a7d08318a6b77a0da1dda40a3eaa7c03010b739b480789fae29b7faa8ab251d76cd0e733690d4471bdf7bcf2aa1fd0d
-
Filesize
45KB
MD503d6a61a54eca4d39f4e786315366d18
SHA1fc1b6fa613af321bd66bddd02707c9a7926bca36
SHA2560efc9e2fb1508176de73e32cf8dc85efb4cfb4d7cf15f4468163239b03a0d8a2
SHA512efcf4a20fbfaf75e4d8b02cdb9c58316ea377736d57d0a28d672d052a982ce2984db3ae64d14aab599a6f0542904a1b710ed0091c6b8d29ce31f6fc7b41d1767
-
Filesize
120KB
MD555d8e04cd7ab9acd1117cb3ce3504c08
SHA1d487375b9f45b592d283a45d380c7a5d0beaca2b
SHA256726d05611e84adc80f3ffb3a8a703e359c1bf9d198448e108e6ce3e5a13f0489
SHA512c104b93709649d88d5a03d0ce678657895ad1294263c869bc1a2a38f1f24fa167fc41eed4e4ff0517b811c069ec35f7fe1efdd6179f6be9e1f6ef33d48f02521
-
Filesize
45KB
MD503d6a61a54eca4d39f4e786315366d18
SHA1fc1b6fa613af321bd66bddd02707c9a7926bca36
SHA2560efc9e2fb1508176de73e32cf8dc85efb4cfb4d7cf15f4468163239b03a0d8a2
SHA512efcf4a20fbfaf75e4d8b02cdb9c58316ea377736d57d0a28d672d052a982ce2984db3ae64d14aab599a6f0542904a1b710ed0091c6b8d29ce31f6fc7b41d1767
-
Filesize
45KB
MD503d6a61a54eca4d39f4e786315366d18
SHA1fc1b6fa613af321bd66bddd02707c9a7926bca36
SHA2560efc9e2fb1508176de73e32cf8dc85efb4cfb4d7cf15f4468163239b03a0d8a2
SHA512efcf4a20fbfaf75e4d8b02cdb9c58316ea377736d57d0a28d672d052a982ce2984db3ae64d14aab599a6f0542904a1b710ed0091c6b8d29ce31f6fc7b41d1767
-
Filesize
152KB
MD5211494b619971b7fa34c456116a70adb
SHA10da44929534dc7104f8b661280586f4021bbb896
SHA256cdfbbfdc781d0568dc2466bfbfa8d3ae8f84f80047d1a57f14a967c5dc8be4f4
SHA51213f785a01ed64d7abad41aafc124ae725a7d08318a6b77a0da1dda40a3eaa7c03010b739b480789fae29b7faa8ab251d76cd0e733690d4471bdf7bcf2aa1fd0d
-
Filesize
289KB
MD53b6a24fece46501f1ae9e7a366c57906
SHA17bb323f9f013d9d300596d29c5bc291f2328bfd7
SHA2566f7ea82f4aca28beb614e4a452136a85a8f17ef72fc58730a201efd9d75f0d21
SHA512dae718b2ad5d1781d57fae0396e97805c29603eb19ea7124a4925b8150a5a4e4f6d6c68b5d46cce67eb50fcf43f97c44acf4fdcc9ab11aabf79ad866d443afd8
-
Filesize
45KB
MD503d6a61a54eca4d39f4e786315366d18
SHA1fc1b6fa613af321bd66bddd02707c9a7926bca36
SHA2560efc9e2fb1508176de73e32cf8dc85efb4cfb4d7cf15f4468163239b03a0d8a2
SHA512efcf4a20fbfaf75e4d8b02cdb9c58316ea377736d57d0a28d672d052a982ce2984db3ae64d14aab599a6f0542904a1b710ed0091c6b8d29ce31f6fc7b41d1767
-
Filesize
152KB
MD5211494b619971b7fa34c456116a70adb
SHA10da44929534dc7104f8b661280586f4021bbb896
SHA256cdfbbfdc781d0568dc2466bfbfa8d3ae8f84f80047d1a57f14a967c5dc8be4f4
SHA51213f785a01ed64d7abad41aafc124ae725a7d08318a6b77a0da1dda40a3eaa7c03010b739b480789fae29b7faa8ab251d76cd0e733690d4471bdf7bcf2aa1fd0d
-
Filesize
152KB
MD5211494b619971b7fa34c456116a70adb
SHA10da44929534dc7104f8b661280586f4021bbb896
SHA256cdfbbfdc781d0568dc2466bfbfa8d3ae8f84f80047d1a57f14a967c5dc8be4f4
SHA51213f785a01ed64d7abad41aafc124ae725a7d08318a6b77a0da1dda40a3eaa7c03010b739b480789fae29b7faa8ab251d76cd0e733690d4471bdf7bcf2aa1fd0d
-
Filesize
152KB
MD5211494b619971b7fa34c456116a70adb
SHA10da44929534dc7104f8b661280586f4021bbb896
SHA256cdfbbfdc781d0568dc2466bfbfa8d3ae8f84f80047d1a57f14a967c5dc8be4f4
SHA51213f785a01ed64d7abad41aafc124ae725a7d08318a6b77a0da1dda40a3eaa7c03010b739b480789fae29b7faa8ab251d76cd0e733690d4471bdf7bcf2aa1fd0d
-
Filesize
152KB
MD5211494b619971b7fa34c456116a70adb
SHA10da44929534dc7104f8b661280586f4021bbb896
SHA256cdfbbfdc781d0568dc2466bfbfa8d3ae8f84f80047d1a57f14a967c5dc8be4f4
SHA51213f785a01ed64d7abad41aafc124ae725a7d08318a6b77a0da1dda40a3eaa7c03010b739b480789fae29b7faa8ab251d76cd0e733690d4471bdf7bcf2aa1fd0d