Analysis
-
max time kernel
130s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2022 16:54
Behavioral task
behavioral1
Sample
Pr0xyArmyBotnet.exe
Resource
win7-20220812-en
General
-
Target
Pr0xyArmyBotnet.exe
-
Size
967KB
-
MD5
5f0cff1fd12ac0fbfdc3dce891891d45
-
SHA1
25b5afb0d88a43a7e98c615544c31b0b4b89b014
-
SHA256
3f6e3f04c74d83d86ddef5779628f9764093e24f7c90c3470f62f1392708f7d5
-
SHA512
d214d1f733f325fa1d2dc4f3307208c8d4e8a25cfd1db8db8c08823a5e7cd6b066e0363141695389bbfef796abc224519db5e69d42fc41b90811f489781b9f9c
-
SSDEEP
24576:xNxsglIPAtgV+rnEQBg2AdqgwGd9OCPltP0gxkR3dCqJO5VxQ75SA1:57uKrnEQi2Ad/wQPLP0gx1qt5SA1
Malware Config
Signatures
-
PlagueBot Executable 4 IoCs
resource yara_rule behavioral2/files/0x0007000000023160-136.dat plaguebot behavioral2/files/0x0007000000023160-137.dat plaguebot behavioral2/files/0x0007000000023160-138.dat plaguebot behavioral2/files/0x0007000000023160-139.dat plaguebot -
Executes dropped EXE 3 IoCs
pid Process 4324 winmgr.exe 2112 winmgr.exe 4816 winmgr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation Pr0xyArmyBotnet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3388 schtasks.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2728 wrote to memory of 3388 2728 Pr0xyArmyBotnet.exe 81 PID 2728 wrote to memory of 3388 2728 Pr0xyArmyBotnet.exe 81 PID 2728 wrote to memory of 3388 2728 Pr0xyArmyBotnet.exe 81 PID 2728 wrote to memory of 1340 2728 Pr0xyArmyBotnet.exe 83 PID 2728 wrote to memory of 1340 2728 Pr0xyArmyBotnet.exe 83 PID 2728 wrote to memory of 1340 2728 Pr0xyArmyBotnet.exe 83 PID 2728 wrote to memory of 4324 2728 Pr0xyArmyBotnet.exe 85 PID 2728 wrote to memory of 4324 2728 Pr0xyArmyBotnet.exe 85 PID 2728 wrote to memory of 4324 2728 Pr0xyArmyBotnet.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pr0xyArmyBotnet.exe"C:\Users\Admin\AppData\Local\Temp\Pr0xyArmyBotnet.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"2⤵
- Creates scheduled task(s)
PID:3388
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Query /FO "LIST" /TN "WinManager"2⤵PID:1340
-
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe" /wait2⤵
- Executes dropped EXE
PID:4324
-
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"1⤵
- Executes dropped EXE
PID:2112
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"1⤵
- Executes dropped EXE
PID:4816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5262630e0d089e0bd7660bfcaaec41ad5
SHA17e14a600587eed79ca07d191563fb374b039d58e
SHA25647d7e92803365d2a7ae5c2222dad9cb759dfb2850ffdfcdb1611f0a30260a64a
SHA5120b701c688c089e5ab50a75dcbe3dbbd0ca3cf65753ab6d028cc68310184068fdaba1d456802b975da09dc059bd9856927a377dbb2b561f18ea015080548bdaa2
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64