Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2022, 18:47
Behavioral task
behavioral1
Sample
Plague.exe
Resource
win7-20221111-en
General
-
Target
Plague.exe
-
Size
967KB
-
MD5
5f0cff1fd12ac0fbfdc3dce891891d45
-
SHA1
25b5afb0d88a43a7e98c615544c31b0b4b89b014
-
SHA256
3f6e3f04c74d83d86ddef5779628f9764093e24f7c90c3470f62f1392708f7d5
-
SHA512
d214d1f733f325fa1d2dc4f3307208c8d4e8a25cfd1db8db8c08823a5e7cd6b066e0363141695389bbfef796abc224519db5e69d42fc41b90811f489781b9f9c
-
SSDEEP
24576:xNxsglIPAtgV+rnEQBg2AdqgwGd9OCPltP0gxkR3dCqJO5VxQ75SA1:57uKrnEQi2Ad/wQPLP0gx1qt5SA1
Malware Config
Signatures
-
PlagueBot Executable 4 IoCs
resource yara_rule behavioral2/files/0x0007000000022e05-136.dat plaguebot behavioral2/files/0x0007000000022e05-137.dat plaguebot behavioral2/files/0x0007000000022e05-138.dat plaguebot behavioral2/files/0x0007000000022e05-139.dat plaguebot -
Executes dropped EXE 3 IoCs
pid Process 2400 winmgr.exe 2028 winmgr.exe 452 winmgr.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation Plague.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2656 schtasks.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4056 wrote to memory of 2656 4056 Plague.exe 79 PID 4056 wrote to memory of 2656 4056 Plague.exe 79 PID 4056 wrote to memory of 2656 4056 Plague.exe 79 PID 4056 wrote to memory of 2260 4056 Plague.exe 81 PID 4056 wrote to memory of 2260 4056 Plague.exe 81 PID 4056 wrote to memory of 2260 4056 Plague.exe 81 PID 4056 wrote to memory of 2400 4056 Plague.exe 83 PID 4056 wrote to memory of 2400 4056 Plague.exe 83 PID 4056 wrote to memory of 2400 4056 Plague.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Plague.exe"C:\Users\Admin\AppData\Local\Temp\Plague.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN "WinManager" /XML "C:\Users\Admin\AppData\Local\Temp\NewTask.xml"2⤵
- Creates scheduled task(s)
PID:2656
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Query /FO "LIST" /TN "WinManager"2⤵PID:2260
-
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe" /wait2⤵
- Executes dropped EXE
PID:2400
-
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"1⤵
- Executes dropped EXE
PID:2028
-
C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"C:\Users\Admin\Saved Games\Pr0xyArmy\winmgr.exe"1⤵
- Executes dropped EXE
PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c465d2744fbdb009e9c5ba6b437c2bf0
SHA15f1f2fc362133064e6d1cdfff77ce33542a2f09d
SHA2565de2cd851498e3c68c93e56b7227ab6ba5163b9015dc22c6045a21477c23cafa
SHA5127c079f5b46534bf93826fedf515f77140ebaa153eb56f59419d3b86c88ae68abb8bf57f361d1f964ea1ec628792851654754f9516d5775dc6da6b6076fb19950
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64
-
Filesize
967KB
MD5adf1ed2bb2c59cd8704fb0d74623165c
SHA15a90d427295987c0b64d93aef8d5b55d095cae3a
SHA25608770382cecfbcfec99e4e2c610e89c458e5a34ff00ac87ace174fb1af4e6e94
SHA51237a43f005c8441ae90e997da594951ac920dbc3e7594d330454d0833ee2fe6c59161e846d53497abd47723154757a1db787684ab39edaf78dcfcc59f5d00be64