Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2022 16:54

General

  • Target

    Pr0xyArmyBotnet.exe

  • Size

    967KB

  • MD5

    5f0cff1fd12ac0fbfdc3dce891891d45

  • SHA1

    25b5afb0d88a43a7e98c615544c31b0b4b89b014

  • SHA256

    3f6e3f04c74d83d86ddef5779628f9764093e24f7c90c3470f62f1392708f7d5

  • SHA512

    d214d1f733f325fa1d2dc4f3307208c8d4e8a25cfd1db8db8c08823a5e7cd6b066e0363141695389bbfef796abc224519db5e69d42fc41b90811f489781b9f9c

  • SSDEEP

    24576:xNxsglIPAtgV+rnEQBg2AdqgwGd9OCPltP0gxkR3dCqJO5VxQ75SA1:57uKrnEQi2Ad/wQPLP0gx1qt5SA1

Score
10/10

Malware Config

Signatures

  • PlagueBot

    PlagueBot is an open source Bot written in Pascal.

  • PlagueBot Executable 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pr0xyArmyBotnet.exe
    "C:\Users\Admin\AppData\Local\Temp\Pr0xyArmyBotnet.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"
      2⤵
      • Creates scheduled task(s)
      PID:2000
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /Query /FO "LIST" /TN "WinManager"
      2⤵
        PID:972
      • C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe
        "C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe" /wait
        2⤵
        • Executes dropped EXE
        PID:1656
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {A8C91502-158D-40C9-95F8-8D26D82511CE} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe
        "C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"
        2⤵
        • Executes dropped EXE
        PID:580
      • C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe
        "C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"
        2⤵
        • Executes dropped EXE
        PID:836

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\NewTask.xml

      Filesize

      1KB

      MD5

      ffa0731212843467ad3a1348c1627769

      SHA1

      07a00e8dcc0de16f15c583ba8b32baf7bed950a2

      SHA256

      9343e83817117d453cfccbeb3357e47841d410e2e50bccd90a118752d07e7b35

      SHA512

      eccea4ef33ca224aa9c8155ecd0957ed023aeef0aaa0f7c52a5d8ea0b22f2dabd9e7e05cfde21ca0c77a7aac4b3b62f4ec7a3dd840df188c71b4d25a0d7c2fc3

    • C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe

      Filesize

      967KB

      MD5

      adf1ed2bb2c59cd8704fb0d74623165c

      SHA1

      5a90d427295987c0b64d93aef8d5b55d095cae3a

      SHA256

      08770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94

      SHA512

      37a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64

    • C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe

      Filesize

      967KB

      MD5

      adf1ed2bb2c59cd8704fb0d74623165c

      SHA1

      5a90d427295987c0b64d93aef8d5b55d095cae3a

      SHA256

      08770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94

      SHA512

      37a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64

    • C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe

      Filesize

      967KB

      MD5

      adf1ed2bb2c59cd8704fb0d74623165c

      SHA1

      5a90d427295987c0b64d93aef8d5b55d095cae3a

      SHA256

      08770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94

      SHA512

      37a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64

    • C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe

      Filesize

      967KB

      MD5

      adf1ed2bb2c59cd8704fb0d74623165c

      SHA1

      5a90d427295987c0b64d93aef8d5b55d095cae3a

      SHA256

      08770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94

      SHA512

      37a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64

    • \Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe

      Filesize

      967KB

      MD5

      adf1ed2bb2c59cd8704fb0d74623165c

      SHA1

      5a90d427295987c0b64d93aef8d5b55d095cae3a

      SHA256

      08770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94

      SHA512

      37a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64

    • \Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe

      Filesize

      967KB

      MD5

      adf1ed2bb2c59cd8704fb0d74623165c

      SHA1

      5a90d427295987c0b64d93aef8d5b55d095cae3a

      SHA256

      08770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94

      SHA512

      37a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64

    • memory/580-64-0x0000000000000000-mapping.dmp

    • memory/816-54-0x0000000075DF1000-0x0000000075DF3000-memory.dmp

      Filesize

      8KB

    • memory/836-67-0x0000000000000000-mapping.dmp

    • memory/972-57-0x0000000000000000-mapping.dmp

    • memory/1656-60-0x0000000000000000-mapping.dmp

    • memory/2000-55-0x0000000000000000-mapping.dmp