Analysis
-
max time kernel
174s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 16:04
Static task
static1
Behavioral task
behavioral1
Sample
bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe
Resource
win10v2004-20221111-en
General
-
Target
bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe
-
Size
252KB
-
MD5
d3ae29e3719d5fd68d31bf3c4d9eac30
-
SHA1
8739e0f1800b0a89c48e400bd36a705c39bf1c4d
-
SHA256
bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2
-
SHA512
db2cb32a5dd1fbb061e1755a48b1b9b1c35ba01a2405e5f26f5afb4f0ead8ccee3f001e6d8178e134ac65eb7b5b2eed064c978ef0fd72188805eefa8245130bf
-
SSDEEP
6144:Qkp72oN2xBsSc6HHLHEKrNhKb1prrTYJR/zMCZf:QkX+sgHLEKphKb1pnYb
Malware Config
Signatures
-
Detects PlugX payload 5 IoCs
resource yara_rule behavioral2/memory/3024-135-0x0000000003750000-0x000000000377E000-memory.dmp family_plugx behavioral2/memory/2296-136-0x0000000001000000-0x000000000102E000-memory.dmp family_plugx behavioral2/memory/3612-138-0x0000000002B50000-0x0000000002B7E000-memory.dmp family_plugx behavioral2/memory/2296-139-0x0000000001000000-0x000000000102E000-memory.dmp family_plugx behavioral2/memory/3612-140-0x0000000002B50000-0x0000000002B7E000-memory.dmp family_plugx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdoberDis = "C:\\Windows\\AdobeDis.exe" bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\MJ svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\MJ\CLSID = 32003500300043003100390039004200360039003000320045003500350037000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2296 svchost.exe 2296 svchost.exe 2296 svchost.exe 2296 svchost.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 2296 svchost.exe 2296 svchost.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 2296 svchost.exe 2296 svchost.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 2296 svchost.exe 2296 svchost.exe 3612 msiexec.exe 3612 msiexec.exe 2296 svchost.exe 2296 svchost.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 2296 svchost.exe 2296 svchost.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe 3612 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2296 svchost.exe 3612 msiexec.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe Token: SeTcbPrivilege 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe Token: SeDebugPrivilege 2296 svchost.exe Token: SeTcbPrivilege 2296 svchost.exe Token: SeDebugPrivilege 3612 msiexec.exe Token: SeTcbPrivilege 3612 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2296 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe 85 PID 3024 wrote to memory of 2296 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe 85 PID 3024 wrote to memory of 2296 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe 85 PID 3024 wrote to memory of 2296 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe 85 PID 3024 wrote to memory of 2296 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe 85 PID 3024 wrote to memory of 2296 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe 85 PID 3024 wrote to memory of 2296 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe 85 PID 3024 wrote to memory of 2296 3024 bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe 85 PID 2296 wrote to memory of 3612 2296 svchost.exe 86 PID 2296 wrote to memory of 3612 2296 svchost.exe 86 PID 2296 wrote to memory of 3612 2296 svchost.exe 86 PID 2296 wrote to memory of 3612 2296 svchost.exe 86 PID 2296 wrote to memory of 3612 2296 svchost.exe 86 PID 2296 wrote to memory of 3612 2296 svchost.exe 86 PID 2296 wrote to memory of 3612 2296 svchost.exe 86 PID 2296 wrote to memory of 3612 2296 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe"C:\Users\Admin\AppData\Local\Temp\bc1c02ee6e4d533847e586205284c7cc4d69909b2bd9c6781c92c766384405f2.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-