Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2022 10:58
Static task
static1
Behavioral task
behavioral1
Sample
8843f39d991fb9ad4da612e523daa84dcea2a124b82466593aab26e65b8830a4.exe
Resource
win7-20220812-en
General
-
Target
8843f39d991fb9ad4da612e523daa84dcea2a124b82466593aab26e65b8830a4.exe
-
Size
342KB
-
MD5
7eaecc4084e090a5f2f0325d1a88ee5f
-
SHA1
963180155ca06a29918013c8783ad349da811e13
-
SHA256
8843f39d991fb9ad4da612e523daa84dcea2a124b82466593aab26e65b8830a4
-
SHA512
a7c82c560611ac19e48c9dd10ffbab64b6a5bd49bd2c2ef2b2b73a6e31418f79b5b4ff3e338111fc7e8d7f47a7e670059d1790b49e359e8924504b36c0b992c9
-
SSDEEP
6144:v4lRkAehaKuqT+FdR4U5LUb8I77edkob1n/2ogNKtP8jv9CG3BeGldF1umkt3IJa:vkWAehJuqT4SPoInix1NgNMsp3BDlD4h
Malware Config
Signatures
-
Detects PlugX payload 7 IoCs
resource yara_rule behavioral2/memory/3532-146-0x0000000000E60000-0x0000000000E98000-memory.dmp family_plugx behavioral2/memory/4828-147-0x0000000000B20000-0x0000000000B58000-memory.dmp family_plugx behavioral2/memory/4636-149-0x0000000002180000-0x00000000021B8000-memory.dmp family_plugx behavioral2/memory/2532-150-0x0000000001170000-0x00000000011A8000-memory.dmp family_plugx behavioral2/memory/752-152-0x0000000000A40000-0x0000000000A78000-memory.dmp family_plugx behavioral2/memory/2532-153-0x0000000001170000-0x00000000011A8000-memory.dmp family_plugx behavioral2/memory/752-154-0x0000000000A40000-0x0000000000A78000-memory.dmp family_plugx -
Executes dropped EXE 3 IoCs
pid Process 4828 setup.exe 4636 NvSmart.exe 3532 NvSmart.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 8843f39d991fb9ad4da612e523daa84dcea2a124b82466593aab26e65b8830a4.exe -
Loads dropped DLL 2 IoCs
pid Process 4636 NvSmart.exe 3532 NvSmart.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 37003200390041003500300038003500380039003200430034004300320046000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2532 svchost.exe 2532 svchost.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 2532 svchost.exe 2532 svchost.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 2532 svchost.exe 2532 svchost.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 2532 svchost.exe 2532 svchost.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 2532 svchost.exe 2532 svchost.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 752 msiexec.exe 2532 svchost.exe 2532 svchost.exe 752 msiexec.exe 752 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2532 svchost.exe 752 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4828 setup.exe Token: SeTcbPrivilege 4828 setup.exe Token: SeDebugPrivilege 4636 NvSmart.exe Token: SeTcbPrivilege 4636 NvSmart.exe Token: SeDebugPrivilege 3532 NvSmart.exe Token: SeTcbPrivilege 3532 NvSmart.exe Token: SeDebugPrivilege 2532 svchost.exe Token: SeTcbPrivilege 2532 svchost.exe Token: SeDebugPrivilege 752 msiexec.exe Token: SeTcbPrivilege 752 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4828 setup.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2288 wrote to memory of 4828 2288 8843f39d991fb9ad4da612e523daa84dcea2a124b82466593aab26e65b8830a4.exe 82 PID 2288 wrote to memory of 4828 2288 8843f39d991fb9ad4da612e523daa84dcea2a124b82466593aab26e65b8830a4.exe 82 PID 2288 wrote to memory of 4828 2288 8843f39d991fb9ad4da612e523daa84dcea2a124b82466593aab26e65b8830a4.exe 82 PID 3532 wrote to memory of 2532 3532 NvSmart.exe 85 PID 3532 wrote to memory of 2532 3532 NvSmart.exe 85 PID 3532 wrote to memory of 2532 3532 NvSmart.exe 85 PID 3532 wrote to memory of 2532 3532 NvSmart.exe 85 PID 3532 wrote to memory of 2532 3532 NvSmart.exe 85 PID 3532 wrote to memory of 2532 3532 NvSmart.exe 85 PID 3532 wrote to memory of 2532 3532 NvSmart.exe 85 PID 3532 wrote to memory of 2532 3532 NvSmart.exe 85 PID 2532 wrote to memory of 752 2532 svchost.exe 86 PID 2532 wrote to memory of 752 2532 svchost.exe 86 PID 2532 wrote to memory of 752 2532 svchost.exe 86 PID 2532 wrote to memory of 752 2532 svchost.exe 86 PID 2532 wrote to memory of 752 2532 svchost.exe 86 PID 2532 wrote to memory of 752 2532 svchost.exe 86 PID 2532 wrote to memory of 752 2532 svchost.exe 86 PID 2532 wrote to memory of 752 2532 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8843f39d991fb9ad4da612e523daa84dcea2a124b82466593aab26e65b8830a4.exe"C:\Users\Admin\AppData\Local\Temp\8843f39d991fb9ad4da612e523daa84dcea2a124b82466593aab26e65b8830a4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\programdata\setup.exe"C:\programdata\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4828
-
-
C:\ProgramData\Wins\NvSmart.exe"C:\ProgramData\Wins\NvSmart.exe" 100 48281⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
C:\ProgramData\Wins\NvSmart.exe"C:\ProgramData\Wins\NvSmart.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 25323⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500B
MD5dd888538b2bf991876f01db9aa516a9a
SHA1fe1eea0167db330632fed4b4787db7fbf024fef5
SHA256290b9df7712cfc3f7801bcbd1fd3de0edd95966361239491e95851769ea989ac
SHA51242bd46c705b5c4e656dbd3292af671b17b0a2d802f00e5df2f4c0a27c95ef3d636b52fd23408de05764fd60543d60e368c285b7dd2f96a7a5172f672ea7d3041
-
Filesize
155KB
MD5c7814f4a0c42065005e82bda45e4d849
SHA1735e60ab5b0d52344851510c2b1e5f7136d65301
SHA2567ba3e66a633e04feac7167e19621e43b7eb0499f38e818c6dedad21f5f6b39be
SHA512ae327466612592b4439dedfa288a54e46102f46d9afd47ad6f236964c016eefc162beffc56394cfca7db92f043f4ff4d02bbdacf70daae9463ed85ce6207dd77
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
4KB
MD50674a0929aec3db11383523b40fa36d1
SHA19f50aa213232690e06aa49b7e7b1640127429117
SHA256fb1c1de76504a35b5c9cf4a60c4a7497064917e0ac96b5389b5ef56c4a02bc17
SHA512ce1a5007499232d6730bf97745bd5e931d6a26d658d3c47a4200a2e225c78e947dbca2487bae77adb65399c2985dce5cbc95f2672ca7e309b3a9f9ba4501d10b
-
Filesize
4KB
MD50674a0929aec3db11383523b40fa36d1
SHA19f50aa213232690e06aa49b7e7b1640127429117
SHA256fb1c1de76504a35b5c9cf4a60c4a7497064917e0ac96b5389b5ef56c4a02bc17
SHA512ce1a5007499232d6730bf97745bd5e931d6a26d658d3c47a4200a2e225c78e947dbca2487bae77adb65399c2985dce5cbc95f2672ca7e309b3a9f9ba4501d10b
-
Filesize
4KB
MD50674a0929aec3db11383523b40fa36d1
SHA19f50aa213232690e06aa49b7e7b1640127429117
SHA256fb1c1de76504a35b5c9cf4a60c4a7497064917e0ac96b5389b5ef56c4a02bc17
SHA512ce1a5007499232d6730bf97745bd5e931d6a26d658d3c47a4200a2e225c78e947dbca2487bae77adb65399c2985dce5cbc95f2672ca7e309b3a9f9ba4501d10b
-
Filesize
341KB
MD5608abb0c39949775368837a6c068b113
SHA124de091315d67bf66d0a089524d5742c79b90400
SHA256bba7c47c1c2af0a0d54d2c44c3386f54b59874b9c878dfa8fdacf72937770a96
SHA51289e843d7f7cb700c35c5bcbcdce6d800e9c6b4ccee3997ec0b38c09b452e3d6edbd638b9e9f520b7fdab4dea7c18a85ad23a94eb257b777e69e504e1dd20cb8f
-
Filesize
341KB
MD5608abb0c39949775368837a6c068b113
SHA124de091315d67bf66d0a089524d5742c79b90400
SHA256bba7c47c1c2af0a0d54d2c44c3386f54b59874b9c878dfa8fdacf72937770a96
SHA51289e843d7f7cb700c35c5bcbcdce6d800e9c6b4ccee3997ec0b38c09b452e3d6edbd638b9e9f520b7fdab4dea7c18a85ad23a94eb257b777e69e504e1dd20cb8f