Analysis

  • max time kernel
    104s
  • max time network
    112s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 18:57

General

  • Target

    Dynatrace-OneAgent-Windows-1.261.201.exe

  • Size

    112.7MB

  • MD5

    e4271f267c3f39e13d58c535edb75a09

  • SHA1

    6bb98a70fae4759da6d0983b375c7be50f626063

  • SHA256

    5e579c320fc1aae241e855979bdda63d2f62036eac053780a03e68bc8814293e

  • SHA512

    3c0434cd5785c279edca2a84f2cd30903e1b120d63ff7785750b1948a79a4ef1aee27dc84088d0a7155102cfe18b41c376a15569d12c16ed16337444f7b0a633

  • SSDEEP

    1572864:p2caw0TIfvBH+9ZA7mh7CMe1JkoHr6uganwVjwFZO7L70RqIcXNMtnMlOpCg/cZs:pdXRvyAqLe1JdoPVmG4RSflQjAww0

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 1 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Detect jar appended to MSI 1 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • NSIS installer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dynatrace-OneAgent-Windows-1.261.201.exe
    "C:\Users\Admin\AppData\Local\Temp\Dynatrace-OneAgent-Windows-1.261.201.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3964
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\Dynatrace-OneAgent-Windows-1.261.201.msi" /L*v "C:\Users\Admin\AppData\Local\Temp\installation_msiexec_20230331-210536.log" PRECONFIGURED_PARAMETERS="--set-server={https://sg-us-east-1-3-219-253-30-prd-91ba76b5-ae84-4252-93d5-717ec93c9.live.dynatrace.com/communication;https://sg-us-east-1-44-197-18-172-prd-91ba76b5-ae84-4252-93d5-717ec93c.live.dynatrace.com/communication;https://sg-us-east-1-52-86-225-129-prd-91ba76b5-ae84-4252-93d5-717ec93c.live.dynatrace.com/communication;https://wcj66953.live.dynatrace.com:443} --set-tenant=wcj66953 --set-tenant-token=H7n4tva4LvVpEynD" INTERNAL_LOG_PATH_FEEDBACK="C:\Users\Admin\AppData\Local\Temp\dynatrace_log_path_feedback.conf"
        3⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4744
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8529A28BE3D9A542F61C8AC9452354D2 C
      2⤵
      • Loads dropped DLL
      PID:4428
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 552B4DF61C83349B02A512C48A51B7BA C
      2⤵
      • Loads dropped DLL
      PID:3052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Dynatrace-OneAgent-Windows-1.261.201.msi

    Filesize

    544.0MB

    MD5

    b0debbdbf057248853a51ffe3f2b0091

    SHA1

    dc3fc19e5686010ea3dd276b5fdd8682de1fb2a5

    SHA256

    3e4d0b2b4bc1102e1bba8bafe94f038625ce5ea126d0de604664f25a2f6d70a2

    SHA512

    00fbf3e2ec66d6ffb19cb9d94785f5c3ef26c75dd24ce291ce65729dd4c6659f5a2947d06585803d65e06765af4bb5ce0b8fa494f148189b7bd1a89b2a47128f

  • C:\Users\Admin\AppData\Local\Temp\MSI2E15.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSI324C.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSI32CA.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSI32CA.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSI33F4.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSI353D.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5

  • C:\Users\Admin\AppData\Local\Temp\MSI36D4.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSI37FE.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5

  • C:\Users\Admin\AppData\Local\Temp\MSI3A12.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSI3AFE.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5

  • C:\Users\Admin\AppData\Local\Temp\MSI3AFE.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5

  • C:\Users\Admin\AppData\Local\Temp\dynatrace_extractor_20230331-210536.log

    Filesize

    1KB

    MD5

    c55e39804092764d95d951b6e3c74dc7

    SHA1

    571297cdf777ccdcbad9213d014e3a07212fd08d

    SHA256

    63762b0ee7798ea3ed47f403bad4889e9571d1b27cef94f23512769866b9fbaf

    SHA512

    2ff81ad77726034d37c7f27cbc7e2769433016613e964c6a68086ab1c21a3ba9fec9ec83b106f8d33eceddc444f22b932d38124e3a10ad85c6f88d0459ffa4cc

  • C:\Users\Admin\AppData\Local\Temp\install.bat

    Filesize

    1KB

    MD5

    48cb1b5fdba74324d2e280ecfd9313bd

    SHA1

    c5008f4a07775de836b3eb5923cedf89c36ecc78

    SHA256

    4d11e3dbcf61bd94847c17a4d6e84f791ce6e79ac4c5b57086b94b713ba8be08

    SHA512

    c4a019f0a14499e70c6b599cd16e286cb7a42609eba0afc62737a0b5e143fa5938e744ea197b327c512644fbbfb87c236a7455bcf928fa15fa5b418e2f356e9a

  • \Users\Admin\AppData\Local\Temp\MSI2E15.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSI324C.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSI32CA.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSI33F4.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSI353D.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5

  • \Users\Admin\AppData\Local\Temp\MSI36D4.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSI37FE.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5

  • \Users\Admin\AppData\Local\Temp\MSI3A12.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSI3AFE.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5