Analysis

  • max time kernel
    359s
  • max time network
    356s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-02-2023 14:04

General

  • Target

    t/Smadav.exe

  • Size

    77KB

  • MD5

    b830cd1b49bd31bcdb6192c20cf0b141

  • SHA1

    b9629fdd735956772e9a3ceedcdb829bba6f8a43

  • SHA256

    21d34a02ec28e9bd6f7b2f96ac7921f5ef08d291416b38a3fc8cf651f11fc820

  • SHA512

    0ffef5b2681e57d3586b878bbf174a667423cd30e75a7f4ef60910922b2f9e3e02af309a7c3f15b70a42b747445513df43ce651dcb85bec7b94bfed6a7704ccd

  • SSDEEP

    1536:NF81hiRzGLSNegJYJoUP8MXTi9Xtr835XoR66E:NFsGGLalYJoDDx835XoRe

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 2 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\t\Smadav.exe
    "C:\Users\Admin\AppData\Local\Temp\t\Smadav.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2780
  • C:\Program Files (x86)\Smadavs\Smadav.exe
    "C:\Program Files (x86)\Smadavs\Smadav.exe" 600 0
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4084
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 601 0
      2⤵
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Windows\SysWOW64\userinit.exe
        C:\Windows\system32\userinit.exe 609 1460
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:4708
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3232

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Smadavs\SmadHook32.dll
      Filesize

      70KB

      MD5

      e1ed9b48016d43398cdf62a61c9b113d

      SHA1

      b8e7183fba57ca867393ea4edf62fe60d1549c94

      SHA256

      2e0b20fd34c70ec0566cb6e0852520fbab9452e3cb7aad8299ae841ac71733cf

      SHA512

      4b5fd58c0d6a59d710d80f0bec216ba19d9e52c1516d799a991995bd7a9f6e45667f924ef7b7320773881d521a1059bb8a2686e1324ed8083c10ca68e1f48714

    • C:\Program Files (x86)\Smadavs\Smadav.dat
      Filesize

      153KB

      MD5

      98f963bae9fd59ab4d50d9e275471ec6

      SHA1

      95c7b1eda105bf690cce854b53b9a308f82fc525

      SHA256

      a59724904c4bf6bfbf182e0235ede0109b65649b5d9f95acdb627610820eba37

      SHA512

      da3311197834a90cebc3d25dd1056717ca7c7d68e30328280b091fdfa2a41598fd3f09854a15c5d0cec939f21b044bab96c8ea28ba53e6c280c945fb31c892ab

    • C:\Program Files (x86)\Smadavs\Smadav.exe
      Filesize

      77KB

      MD5

      b830cd1b49bd31bcdb6192c20cf0b141

      SHA1

      b9629fdd735956772e9a3ceedcdb829bba6f8a43

      SHA256

      21d34a02ec28e9bd6f7b2f96ac7921f5ef08d291416b38a3fc8cf651f11fc820

      SHA512

      0ffef5b2681e57d3586b878bbf174a667423cd30e75a7f4ef60910922b2f9e3e02af309a7c3f15b70a42b747445513df43ce651dcb85bec7b94bfed6a7704ccd

    • C:\Program Files (x86)\Smadavs\Smadav.exe
      Filesize

      77KB

      MD5

      b830cd1b49bd31bcdb6192c20cf0b141

      SHA1

      b9629fdd735956772e9a3ceedcdb829bba6f8a43

      SHA256

      21d34a02ec28e9bd6f7b2f96ac7921f5ef08d291416b38a3fc8cf651f11fc820

      SHA512

      0ffef5b2681e57d3586b878bbf174a667423cd30e75a7f4ef60910922b2f9e3e02af309a7c3f15b70a42b747445513df43ce651dcb85bec7b94bfed6a7704ccd

    • \Program Files (x86)\Smadavs\SmadHook32.dll
      Filesize

      70KB

      MD5

      e1ed9b48016d43398cdf62a61c9b113d

      SHA1

      b8e7183fba57ca867393ea4edf62fe60d1549c94

      SHA256

      2e0b20fd34c70ec0566cb6e0852520fbab9452e3cb7aad8299ae841ac71733cf

      SHA512

      4b5fd58c0d6a59d710d80f0bec216ba19d9e52c1516d799a991995bd7a9f6e45667f924ef7b7320773881d521a1059bb8a2686e1324ed8083c10ca68e1f48714

    • memory/1460-195-0x0000000000000000-mapping.dmp
    • memory/2780-155-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-126-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-127-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-130-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-129-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-131-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-132-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-133-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-134-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-135-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-136-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-138-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-137-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-121-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-140-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-142-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-141-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-143-0x0000000002180000-0x00000000021A7000-memory.dmp
      Filesize

      156KB

    • memory/2780-144-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-145-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-146-0x0000000002230000-0x0000000003230000-memory.dmp
      Filesize

      16.0MB

    • memory/2780-147-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-148-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-149-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-151-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-150-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-152-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-153-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-154-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-120-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-122-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-123-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-124-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-139-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-128-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/2780-125-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-157-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-165-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-162-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-161-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-166-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-167-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-168-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-169-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-171-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-170-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-174-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-163-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-176-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-158-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-179-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-178-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-180-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-181-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-182-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-183-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-184-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-177-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-159-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-185-0x0000000000F10000-0x0000000001F10000-memory.dmp
      Filesize

      16.0MB

    • memory/4084-186-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-187-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-189-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-188-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4084-160-0x0000000077710000-0x000000007789E000-memory.dmp
      Filesize

      1.6MB

    • memory/4708-238-0x0000000000000000-mapping.dmp