Analysis

  • max time kernel
    56s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    31-03-2023 18:57

General

  • Target

    Dynatrace-OneAgent-Windows-1.261.201.exe

  • Size

    112.7MB

  • MD5

    e4271f267c3f39e13d58c535edb75a09

  • SHA1

    6bb98a70fae4759da6d0983b375c7be50f626063

  • SHA256

    5e579c320fc1aae241e855979bdda63d2f62036eac053780a03e68bc8814293e

  • SHA512

    3c0434cd5785c279edca2a84f2cd30903e1b120d63ff7785750b1948a79a4ef1aee27dc84088d0a7155102cfe18b41c376a15569d12c16ed16337444f7b0a633

  • SSDEEP

    1572864:p2caw0TIfvBH+9ZA7mh7CMe1JkoHr6uganwVjwFZO7L70RqIcXNMtnMlOpCg/cZs:pdXRvyAqLe1JdoPVmG4RSflQjAww0

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 1 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Detect jar appended to MSI 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • NSIS installer 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dynatrace-OneAgent-Windows-1.261.201.exe
    "C:\Users\Admin\AppData\Local\Temp\Dynatrace-OneAgent-Windows-1.261.201.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\Dynatrace-OneAgent-Windows-1.261.201.msi" /L*v "C:\Users\Admin\AppData\Local\Temp\installation_msiexec_20230331-210126.log" PRECONFIGURED_PARAMETERS="--set-server={https://sg-us-east-1-3-219-253-30-prd-91ba76b5-ae84-4252-93d5-717ec93c9.live.dynatrace.com/communication;https://sg-us-east-1-44-197-18-172-prd-91ba76b5-ae84-4252-93d5-717ec93c.live.dynatrace.com/communication;https://sg-us-east-1-52-86-225-129-prd-91ba76b5-ae84-4252-93d5-717ec93c.live.dynatrace.com/communication;https://wcj66953.live.dynatrace.com:443} --set-tenant=wcj66953 --set-tenant-token=H7n4tva4LvVpEynD" INTERNAL_LOG_PATH_FEEDBACK="C:\Users\Admin\AppData\Local\Temp\dynatrace_log_path_feedback.conf"
        3⤵
        • Blocklisted process makes network request
        • Enumerates connected drives
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1336
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8CA4C9542EDE4651A403F18E0FDCC06D C
      2⤵
      • Loads dropped DLL
      PID:1616
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 8626579110512738BAC1241E28F581B6 C
      2⤵
      • Loads dropped DLL
      PID:1816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Temp\CabE469.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Dynatrace-OneAgent-Windows-1.261.201.msi

    Filesize

    544.0MB

    MD5

    b0debbdbf057248853a51ffe3f2b0091

    SHA1

    dc3fc19e5686010ea3dd276b5fdd8682de1fb2a5

    SHA256

    3e4d0b2b4bc1102e1bba8bafe94f038625ce5ea126d0de604664f25a2f6d70a2

    SHA512

    00fbf3e2ec66d6ffb19cb9d94785f5c3ef26c75dd24ce291ce65729dd4c6659f5a2947d06585803d65e06765af4bb5ce0b8fa494f148189b7bd1a89b2a47128f

  • C:\Users\Admin\AppData\Local\Temp\MSIE9B6.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSIEBAB.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSIEC57.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSIEC57.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSIED52.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5

  • C:\Users\Admin\AppData\Local\Temp\MSIF197.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • C:\Users\Admin\AppData\Local\Temp\MSIF205.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5

  • C:\Users\Admin\AppData\Local\Temp\TarE5C3.tmp

    Filesize

    161KB

    MD5

    73b4b714b42fc9a6aaefd0ae59adb009

    SHA1

    efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

    SHA256

    c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

    SHA512

    73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

  • C:\Users\Admin\AppData\Local\Temp\TarE751.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Local\Temp\dynatrace_extractor_20230331-210126.log

    Filesize

    1KB

    MD5

    2cfc535eec3fe588cc34a95b41ba46fb

    SHA1

    27281ad162d7df6ede2818e905d8d03bc7c553af

    SHA256

    20261536332d46aad48e5471748703755b6ff42334b7a1aef6b88a668808873e

    SHA512

    f2232d2a5c2269124fba0e48fc624b53f19c931ec098f6b908c9425996f950f474b379e52bba41964362b3f60ce29201265681910b00baae4dab65e62bd58253

  • C:\Users\Admin\AppData\Local\Temp\dynatrace_extractor_20230331-210126.log

    Filesize

    1KB

    MD5

    424eb8bcf7f6ee9700f10da6ab98c68c

    SHA1

    d0eac0d3edd2d6d732a16ade0dc38aaa612967d2

    SHA256

    36a2874aa263cfe2348e1fd419aeca86d804742083e378b022d58d01cb146d1e

    SHA512

    8b71da70678bb4b2cbe83ab1fd98bb0519dba02c63cbdcc1dffc1350ae82507b642a830e6c876ab7158d9c56239565c28904bf30bb326099410dc79ed84d8535

  • C:\Users\Admin\AppData\Local\Temp\install.bat

    Filesize

    1KB

    MD5

    c4717d7f6de0b3b630bde615a81f31c5

    SHA1

    f28059be98e27bcb9c1090f77e3f29eadbbcf101

    SHA256

    14cf6b5c9010ebf2139535ad25dab48a2d04e14b0291f1826e6c1b6d292f2a17

    SHA512

    ee0fc4c5566e99017c4443005b1684872b576fa9be16c7a531e79bd0a57d2d73cbe93f0cb7d8a98787b3ec777f3971c546fa401701217f62ddf8e753638354dd

  • \Users\Admin\AppData\Local\Temp\MSIE9B6.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSIEBAB.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSIEC57.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSIED52.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5

  • \Users\Admin\AppData\Local\Temp\MSIF197.tmp

    Filesize

    557KB

    MD5

    db7612f0fd6408d664185cfc81bef0cb

    SHA1

    19a6334ec00365b4f4e57d387ed885b32aa7c9aa

    SHA256

    e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240

    SHA512

    25e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9

  • \Users\Admin\AppData\Local\Temp\MSIF205.tmp

    Filesize

    4.0MB

    MD5

    01189e13910f1590cd75ff56c2d6dc1f

    SHA1

    179fb404fbd37e722742bdf4fbcfc76e7ce80af9

    SHA256

    c46747149fdb59cd44246cc2501c1a467ebfccb11c5e3d9c7da512d021893d6f

    SHA512

    5188ee3dbb560efb2307eedfd960a25691300eb12bc206c18243b34f5a89599eb471a3f77ec4d78ecbfbe527980854d063cef0ea5897d31c7ee6f1b8bc86f9c5