Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-12-2022 18:47
Behavioral task
behavioral1
Sample
Plague.exe
Resource
win7-20221111-en
General
-
Target
Plague.exe
-
Size
967KB
-
MD5
5f0cff1fd12ac0fbfdc3dce891891d45
-
SHA1
25b5afb0d88a43a7e98c615544c31b0b4b89b014
-
SHA256
3f6e3f04c74d83d86ddef5779628f9764093e24f7c90c3470f62f1392708f7d5
-
SHA512
d214d1f733f325fa1d2dc4f3307208c8d4e8a25cfd1db8db8c08823a5e7cd6b066e0363141695389bbfef796abc224519db5e69d42fc41b90811f489781b9f9c
-
SSDEEP
24576:xNxsglIPAtgV+rnEQBg2AdqgwGd9OCPltP0gxkR3dCqJO5VxQ75SA1:57uKrnEQi2Ad/wQPLP0gx1qt5SA1
Malware Config
Signatures
-
PlagueBot Executable 6 IoCs
resource yara_rule behavioral1/files/0x0008000000014234-58.dat plaguebot behavioral1/files/0x0008000000014234-59.dat plaguebot behavioral1/files/0x0008000000014234-61.dat plaguebot behavioral1/files/0x0008000000014234-63.dat plaguebot behavioral1/files/0x0008000000014234-65.dat plaguebot behavioral1/files/0x0008000000014234-68.dat plaguebot -
Executes dropped EXE 3 IoCs
pid Process 268 winmgr.exe 1268 winmgr.exe 2016 winmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 900 Plague.exe 900 Plague.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1772 schtasks.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 900 wrote to memory of 1772 900 Plague.exe 28 PID 900 wrote to memory of 1772 900 Plague.exe 28 PID 900 wrote to memory of 1772 900 Plague.exe 28 PID 900 wrote to memory of 1772 900 Plague.exe 28 PID 900 wrote to memory of 112 900 Plague.exe 30 PID 900 wrote to memory of 112 900 Plague.exe 30 PID 900 wrote to memory of 112 900 Plague.exe 30 PID 900 wrote to memory of 112 900 Plague.exe 30 PID 900 wrote to memory of 268 900 Plague.exe 32 PID 900 wrote to memory of 268 900 Plague.exe 32 PID 900 wrote to memory of 268 900 Plague.exe 32 PID 900 wrote to memory of 268 900 Plague.exe 32 PID 1884 wrote to memory of 1268 1884 taskeng.exe 34 PID 1884 wrote to memory of 1268 1884 taskeng.exe 34 PID 1884 wrote to memory of 1268 1884 taskeng.exe 34 PID 1884 wrote to memory of 1268 1884 taskeng.exe 34 PID 1884 wrote to memory of 2016 1884 taskeng.exe 35 PID 1884 wrote to memory of 2016 1884 taskeng.exe 35 PID 1884 wrote to memory of 2016 1884 taskeng.exe 35 PID 1884 wrote to memory of 2016 1884 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Plague.exe"C:\Users\Admin\AppData\Local\Temp\Plague.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"2⤵
- Creates scheduled task(s)
PID:1772
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Query /FO "LIST" /TN "WinManager"2⤵PID:112
-
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe" /wait2⤵
- Executes dropped EXE
PID:268
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0781E5A5-48DD-45B6-8CCC-8901334E4594} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"2⤵
- Executes dropped EXE
PID:1268
-
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"2⤵
- Executes dropped EXE
PID:2016
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD583102c43cf7969f8db9b271758deeb07
SHA18849808c80780597cc729b4cba149eaa5d6e13bc
SHA2562547ecacf26429c449b51a7337b3e43aceb153ad8ed3973c52d587115a183ec1
SHA51205d42d1cb2c6e95587e07dd1d22515f0e161370b4911a3181a59788ef439558ecb13f795415754f8dc0a59b544e006eccc6c10391b4b64fd67cc0d7266df7bd4
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64