Analysis

  • max time kernel
    1801s
  • max time network
    1797s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    15-02-2023 14:00

General

  • Target

    t/Smadav.exe

  • Size

    77KB

  • MD5

    b830cd1b49bd31bcdb6192c20cf0b141

  • SHA1

    b9629fdd735956772e9a3ceedcdb829bba6f8a43

  • SHA256

    21d34a02ec28e9bd6f7b2f96ac7921f5ef08d291416b38a3fc8cf651f11fc820

  • SHA512

    0ffef5b2681e57d3586b878bbf174a667423cd30e75a7f4ef60910922b2f9e3e02af309a7c3f15b70a42b747445513df43ce651dcb85bec7b94bfed6a7704ccd

  • SSDEEP

    1536:NF81hiRzGLSNegJYJoUP8MXTi9Xtr835XoR66E:NFsGGLalYJoDDx835XoRe

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 4 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Modifies data under HKEY_USERS 30 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\t\Smadav.exe
    "C:\Users\Admin\AppData\Local\Temp\t\Smadav.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2012
  • C:\Program Files (x86)\Smadavs\Smadav.exe
    "C:\Program Files (x86)\Smadavs\Smadav.exe" 600 0
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 601 0
      2⤵
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1520
      • C:\Windows\SysWOW64\userinit.exe
        C:\Windows\system32\userinit.exe 609 1520
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Smadavs\SmadHook32.dll

    Filesize

    70KB

    MD5

    e1ed9b48016d43398cdf62a61c9b113d

    SHA1

    b8e7183fba57ca867393ea4edf62fe60d1549c94

    SHA256

    2e0b20fd34c70ec0566cb6e0852520fbab9452e3cb7aad8299ae841ac71733cf

    SHA512

    4b5fd58c0d6a59d710d80f0bec216ba19d9e52c1516d799a991995bd7a9f6e45667f924ef7b7320773881d521a1059bb8a2686e1324ed8083c10ca68e1f48714

  • C:\Program Files (x86)\Smadavs\Smadav.dat

    Filesize

    153KB

    MD5

    98f963bae9fd59ab4d50d9e275471ec6

    SHA1

    95c7b1eda105bf690cce854b53b9a308f82fc525

    SHA256

    a59724904c4bf6bfbf182e0235ede0109b65649b5d9f95acdb627610820eba37

    SHA512

    da3311197834a90cebc3d25dd1056717ca7c7d68e30328280b091fdfa2a41598fd3f09854a15c5d0cec939f21b044bab96c8ea28ba53e6c280c945fb31c892ab

  • C:\Program Files (x86)\Smadavs\Smadav.exe

    Filesize

    77KB

    MD5

    b830cd1b49bd31bcdb6192c20cf0b141

    SHA1

    b9629fdd735956772e9a3ceedcdb829bba6f8a43

    SHA256

    21d34a02ec28e9bd6f7b2f96ac7921f5ef08d291416b38a3fc8cf651f11fc820

    SHA512

    0ffef5b2681e57d3586b878bbf174a667423cd30e75a7f4ef60910922b2f9e3e02af309a7c3f15b70a42b747445513df43ce651dcb85bec7b94bfed6a7704ccd

  • \Program Files (x86)\Smadavs\SmadHook32.dll

    Filesize

    70KB

    MD5

    e1ed9b48016d43398cdf62a61c9b113d

    SHA1

    b8e7183fba57ca867393ea4edf62fe60d1549c94

    SHA256

    2e0b20fd34c70ec0566cb6e0852520fbab9452e3cb7aad8299ae841ac71733cf

    SHA512

    4b5fd58c0d6a59d710d80f0bec216ba19d9e52c1516d799a991995bd7a9f6e45667f924ef7b7320773881d521a1059bb8a2686e1324ed8083c10ca68e1f48714

  • memory/1520-63-0x00000000000A0000-0x00000000000C4000-memory.dmp

    Filesize

    144KB

  • memory/1520-66-0x0000000000850000-0x0000000006893000-memory.dmp

    Filesize

    96.3MB

  • memory/1520-67-0x0000000000080000-0x0000000000082000-memory.dmp

    Filesize

    8KB

  • memory/1760-72-0x0000000002000000-0x0000000008043000-memory.dmp

    Filesize

    96.3MB

  • memory/1956-61-0x0000000001D90000-0x0000000002D90000-memory.dmp

    Filesize

    16.0MB

  • memory/2012-56-0x0000000000230000-0x0000000000257000-memory.dmp

    Filesize

    156KB

  • memory/2012-55-0x0000000076931000-0x0000000076933000-memory.dmp

    Filesize

    8KB

  • memory/2012-54-0x0000000001D90000-0x0000000002D90000-memory.dmp

    Filesize

    16.0MB