Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-12-2022 16:54
Behavioral task
behavioral1
Sample
Pr0xyArmyBotnet.exe
Resource
win7-20220812-en
General
-
Target
Pr0xyArmyBotnet.exe
-
Size
967KB
-
MD5
5f0cff1fd12ac0fbfdc3dce891891d45
-
SHA1
25b5afb0d88a43a7e98c615544c31b0b4b89b014
-
SHA256
3f6e3f04c74d83d86ddef5779628f9764093e24f7c90c3470f62f1392708f7d5
-
SHA512
d214d1f733f325fa1d2dc4f3307208c8d4e8a25cfd1db8db8c08823a5e7cd6b066e0363141695389bbfef796abc224519db5e69d42fc41b90811f489781b9f9c
-
SSDEEP
24576:xNxsglIPAtgV+rnEQBg2AdqgwGd9OCPltP0gxkR3dCqJO5VxQ75SA1:57uKrnEQi2Ad/wQPLP0gx1qt5SA1
Malware Config
Signatures
-
PlagueBot Executable 6 IoCs
resource yara_rule behavioral1/files/0x0008000000014248-58.dat plaguebot behavioral1/files/0x0008000000014248-59.dat plaguebot behavioral1/files/0x0008000000014248-61.dat plaguebot behavioral1/files/0x0008000000014248-63.dat plaguebot behavioral1/files/0x0008000000014248-65.dat plaguebot behavioral1/files/0x0008000000014248-68.dat plaguebot -
Executes dropped EXE 3 IoCs
pid Process 1656 winmgr.exe 580 winmgr.exe 836 winmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 816 Pr0xyArmyBotnet.exe 816 Pr0xyArmyBotnet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2000 schtasks.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 816 wrote to memory of 2000 816 Pr0xyArmyBotnet.exe 27 PID 816 wrote to memory of 2000 816 Pr0xyArmyBotnet.exe 27 PID 816 wrote to memory of 2000 816 Pr0xyArmyBotnet.exe 27 PID 816 wrote to memory of 2000 816 Pr0xyArmyBotnet.exe 27 PID 816 wrote to memory of 972 816 Pr0xyArmyBotnet.exe 29 PID 816 wrote to memory of 972 816 Pr0xyArmyBotnet.exe 29 PID 816 wrote to memory of 972 816 Pr0xyArmyBotnet.exe 29 PID 816 wrote to memory of 972 816 Pr0xyArmyBotnet.exe 29 PID 816 wrote to memory of 1656 816 Pr0xyArmyBotnet.exe 31 PID 816 wrote to memory of 1656 816 Pr0xyArmyBotnet.exe 31 PID 816 wrote to memory of 1656 816 Pr0xyArmyBotnet.exe 31 PID 816 wrote to memory of 1656 816 Pr0xyArmyBotnet.exe 31 PID 840 wrote to memory of 580 840 taskeng.exe 33 PID 840 wrote to memory of 580 840 taskeng.exe 33 PID 840 wrote to memory of 580 840 taskeng.exe 33 PID 840 wrote to memory of 580 840 taskeng.exe 33 PID 840 wrote to memory of 836 840 taskeng.exe 34 PID 840 wrote to memory of 836 840 taskeng.exe 34 PID 840 wrote to memory of 836 840 taskeng.exe 34 PID 840 wrote to memory of 836 840 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pr0xyArmyBotnet.exe"C:\Users\Admin\AppData\Local\Temp\Pr0xyArmyBotnet.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"2⤵
- Creates scheduled task(s)
PID:2000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Query /FO "LIST" /TN "WinManager"2⤵PID:972
-
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe" /wait2⤵
- Executes dropped EXE
PID:1656
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {A8C91502-158D-40C9-95F8-8D26D82511CE} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"2⤵
- Executes dropped EXE
PID:580
-
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"2⤵
- Executes dropped EXE
PID:836
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ffa0731212843467ad3a1348c1627769
SHA107a00e8dcc0de16f15c583ba8b32baf7bed950a2
SHA2569343e83817117d453cfccbeb3357e47841d410e2e50bccd90a118752d07e7b35
SHA512eccea4ef33ca224aa9c8155ecd0957ed023aeef0aaa0f7c52a5d8ea0b22f2dabd9e7e05cfde21ca0c77a7aac4b3b62f4ec7a3dd840df188c71b4d25a0d7c2fc3
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64