Overview
overview
10Static
static
1plugx/4094...ba.exe
windows7-x64
7plugx/4094...ba.exe
windows10-2004-x64
7plugx/5a94...11.exe
windows7-x64
1plugx/5a94...11.exe
windows10-2004-x64
1plugx/8df2...43.exe
windows7-x64
10plugx/8df2...43.exe
windows10-2004-x64
10plugx/9aff...0d.exe
windows7-x64
1plugx/9aff...0d.exe
windows10-2004-x64
1plugx/a2a0...5d.exe
windows7-x64
1plugx/a2a0...5d.exe
windows10-2004-x64
1plugx/a8e2...a3.exe
windows7-x64
10plugx/a8e2...a3.exe
windows10-2004-x64
10plugx/ac75...f2.exe
windows7-x64
7plugx/ac75...f2.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-04-2023 06:31
Static task
static1
Behavioral task
behavioral1
Sample
plugx/4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
plugx/4094db927542c7b1d4a770d30231fcc34687a47058821001f4a46808692fcdba.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
plugx/5a9468a87997f2363995e264505105f6a235b66543bb28635fb74f78704e9111.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
plugx/5a9468a87997f2363995e264505105f6a235b66543bb28635fb74f78704e9111.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
plugx/8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
plugx/8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
plugx/9aff1e12a1b447ca8ab3076f684716a859c906f9b2d0e870d59d0f06fc548d0d.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
plugx/9aff1e12a1b447ca8ab3076f684716a859c906f9b2d0e870d59d0f06fc548d0d.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
plugx/a2a0ce67c239385c1ec1d5d29ff91a7daf91cf2b4368dc91d84dbb598becdc5d.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
plugx/a2a0ce67c239385c1ec1d5d29ff91a7daf91cf2b4368dc91d84dbb598becdc5d.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
plugx/a8e2b38c576bf19f6b0bed69c85c2a64445337087257cf566388f7b0d6d583a3.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
plugx/a8e2b38c576bf19f6b0bed69c85c2a64445337087257cf566388f7b0d6d583a3.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
plugx/ac758e6ad91120d1c98248ed2582c1ab472d83ef354f9c4b2f62167a699565f2.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
plugx/ac758e6ad91120d1c98248ed2582c1ab472d83ef354f9c4b2f62167a699565f2.exe
Resource
win10v2004-20230220-en
General
-
Target
plugx/8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe
-
Size
267KB
-
MD5
ec3a003082a19fd6a00f84df315d18a2
-
SHA1
e7268a6982c3d17aaf472b331b67fbdbc4000dec
-
SHA256
8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143
-
SHA512
d3e804add5ebf3efdbf4794cbc1cc53bfc0485298771a1f43d7d683870f82561be3387d83436cf308e260bd600ce475998add0d094d63ab46f3dd75ad16f74aa
-
SSDEEP
6144:yz+92mhAMJ/cPl3ieBLVcFtRbUN5T+ZjOEGdjP/Z17jsjnvlmVr:yK2mhAMJ/cPlfcFnU6kdZUnvYF
Malware Config
Signatures
-
Detects PlugX payload 26 IoCs
resource yara_rule behavioral5/memory/1120-79-0x0000000000270000-0x0000000000297000-memory.dmp family_plugx behavioral5/memory/1428-97-0x0000000000260000-0x0000000000287000-memory.dmp family_plugx behavioral5/memory/1528-102-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1120-105-0x0000000000270000-0x0000000000297000-memory.dmp family_plugx behavioral5/memory/1428-103-0x0000000000260000-0x0000000000287000-memory.dmp family_plugx behavioral5/memory/1528-106-0x0000000000270000-0x0000000000297000-memory.dmp family_plugx behavioral5/memory/1528-107-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1120-108-0x0000000000270000-0x0000000000297000-memory.dmp family_plugx behavioral5/memory/1528-109-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1528-117-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1528-118-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1528-119-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1528-120-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1528-121-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1028-126-0x0000000000300000-0x0000000000325000-memory.dmp family_plugx behavioral5/memory/1028-128-0x0000000000300000-0x0000000000325000-memory.dmp family_plugx behavioral5/memory/1028-129-0x0000000000300000-0x0000000000325000-memory.dmp family_plugx behavioral5/memory/1028-130-0x0000000000300000-0x0000000000325000-memory.dmp family_plugx behavioral5/memory/1528-131-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1528-132-0x0000000000270000-0x0000000000297000-memory.dmp family_plugx behavioral5/memory/1528-133-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1528-134-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1028-136-0x0000000000300000-0x0000000000325000-memory.dmp family_plugx behavioral5/memory/1528-137-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1528-139-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1528-141-0x0000000000160000-0x0000000000185000-memory.dmp family_plugx -
Deletes itself 1 IoCs
pid Process 1528 svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 1120 Mc.exe 1428 Mc.exe -
Loads dropped DLL 7 IoCs
pid Process 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 1120 Mc.exe 1428 Mc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\XXXX svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\XXXX\CLSID = 33003300410039004500340037003200390032004500450041003700380037000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1528 svchost.exe 1528 svchost.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1028 msiexec.exe 1528 svchost.exe 1028 msiexec.exe 1028 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1028 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1120 Mc.exe Token: SeTcbPrivilege 1120 Mc.exe Token: SeDebugPrivilege 1428 Mc.exe Token: SeTcbPrivilege 1428 Mc.exe Token: SeDebugPrivilege 1528 svchost.exe Token: SeTcbPrivilege 1528 svchost.exe Token: SeDebugPrivilege 1028 msiexec.exe Token: SeTcbPrivilege 1028 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1120 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 27 PID 1476 wrote to memory of 1120 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 27 PID 1476 wrote to memory of 1120 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 27 PID 1476 wrote to memory of 1120 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 27 PID 1476 wrote to memory of 1120 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 27 PID 1476 wrote to memory of 1120 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 27 PID 1476 wrote to memory of 1120 1476 8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe 27 PID 1428 wrote to memory of 1528 1428 Mc.exe 29 PID 1428 wrote to memory of 1528 1428 Mc.exe 29 PID 1428 wrote to memory of 1528 1428 Mc.exe 29 PID 1428 wrote to memory of 1528 1428 Mc.exe 29 PID 1428 wrote to memory of 1528 1428 Mc.exe 29 PID 1428 wrote to memory of 1528 1428 Mc.exe 29 PID 1428 wrote to memory of 1528 1428 Mc.exe 29 PID 1428 wrote to memory of 1528 1428 Mc.exe 29 PID 1428 wrote to memory of 1528 1428 Mc.exe 29 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30 PID 1528 wrote to memory of 1028 1528 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\plugx\8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe"C:\Users\Admin\AppData\Local\Temp\plugx\8df2949d77aff0ef84af7c2a892602e05d3518d85b87fa5ed56493199efd2143.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mc.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\ProgramData\MC\Mc.exeC:\ProgramData\MC\Mc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Deletes itself
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5884d46c01c762ad6ddd2759fd921bf71
SHA1d201b130232e0ea411daa23c1ba2892fe6468712
SHA2563124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe
SHA5120acb3fe1050c1c07880ed2161956c4bee7c1e813a5fb518059b9bb88ed0bff50c108ad7b3708b6568413df4bdcc6f4d26dcd8759625a5ab77c4b26c1ba4f8813
-
Filesize
41KB
MD5ffa5f4b6b580d53bc311d6e5bace3110
SHA1d599ca575b995d8de971aed8a64762225bde386d
SHA2569857e40be1fb5b9b6db93dc03f96f6b3ff0ffab85af7944dddcac0e37775ab02
SHA51220ac2b2508e931d545e952d29afa5ee8ce6600934e56ff8aee169ee2e1cb7c0d7eb1396c947edb45c31a434bd17ceada0cdfd5ea0c11ce7cc7298cbac4c9ca90
-
Filesize
41KB
MD5ffa5f4b6b580d53bc311d6e5bace3110
SHA1d599ca575b995d8de971aed8a64762225bde386d
SHA2569857e40be1fb5b9b6db93dc03f96f6b3ff0ffab85af7944dddcac0e37775ab02
SHA51220ac2b2508e931d545e952d29afa5ee8ce6600934e56ff8aee169ee2e1cb7c0d7eb1396c947edb45c31a434bd17ceada0cdfd5ea0c11ce7cc7298cbac4c9ca90
-
Filesize
98KB
MD5e8f20ec41ae7091198579a1b731f6da2
SHA1ac524110bcf5148db5f0d0b7f0ff42f3470209b4
SHA25627b9495c45248c3702d355323d8e70731f87c4889abebc6967265c83527e40e7
SHA5127686e53076993926ed7f012d5cde0848d6b5119ef1a5f6760e382f72c2ff3205a5d2fc6846778ee4e560bd01c8b2eedb46ab5efed8152aa588891dfa8b761bd8
-
Filesize
98KB
MD5e8f20ec41ae7091198579a1b731f6da2
SHA1ac524110bcf5148db5f0d0b7f0ff42f3470209b4
SHA25627b9495c45248c3702d355323d8e70731f87c4889abebc6967265c83527e40e7
SHA5127686e53076993926ed7f012d5cde0848d6b5119ef1a5f6760e382f72c2ff3205a5d2fc6846778ee4e560bd01c8b2eedb46ab5efed8152aa588891dfa8b761bd8
-
Filesize
137KB
MD5884d46c01c762ad6ddd2759fd921bf71
SHA1d201b130232e0ea411daa23c1ba2892fe6468712
SHA2563124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe
SHA5120acb3fe1050c1c07880ed2161956c4bee7c1e813a5fb518059b9bb88ed0bff50c108ad7b3708b6568413df4bdcc6f4d26dcd8759625a5ab77c4b26c1ba4f8813
-
Filesize
137KB
MD5884d46c01c762ad6ddd2759fd921bf71
SHA1d201b130232e0ea411daa23c1ba2892fe6468712
SHA2563124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe
SHA5120acb3fe1050c1c07880ed2161956c4bee7c1e813a5fb518059b9bb88ed0bff50c108ad7b3708b6568413df4bdcc6f4d26dcd8759625a5ab77c4b26c1ba4f8813
-
Filesize
137KB
MD5884d46c01c762ad6ddd2759fd921bf71
SHA1d201b130232e0ea411daa23c1ba2892fe6468712
SHA2563124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe
SHA5120acb3fe1050c1c07880ed2161956c4bee7c1e813a5fb518059b9bb88ed0bff50c108ad7b3708b6568413df4bdcc6f4d26dcd8759625a5ab77c4b26c1ba4f8813
-
Filesize
41KB
MD5ffa5f4b6b580d53bc311d6e5bace3110
SHA1d599ca575b995d8de971aed8a64762225bde386d
SHA2569857e40be1fb5b9b6db93dc03f96f6b3ff0ffab85af7944dddcac0e37775ab02
SHA51220ac2b2508e931d545e952d29afa5ee8ce6600934e56ff8aee169ee2e1cb7c0d7eb1396c947edb45c31a434bd17ceada0cdfd5ea0c11ce7cc7298cbac4c9ca90
-
Filesize
98KB
MD5e8f20ec41ae7091198579a1b731f6da2
SHA1ac524110bcf5148db5f0d0b7f0ff42f3470209b4
SHA25627b9495c45248c3702d355323d8e70731f87c4889abebc6967265c83527e40e7
SHA5127686e53076993926ed7f012d5cde0848d6b5119ef1a5f6760e382f72c2ff3205a5d2fc6846778ee4e560bd01c8b2eedb46ab5efed8152aa588891dfa8b761bd8
-
Filesize
41KB
MD5ffa5f4b6b580d53bc311d6e5bace3110
SHA1d599ca575b995d8de971aed8a64762225bde386d
SHA2569857e40be1fb5b9b6db93dc03f96f6b3ff0ffab85af7944dddcac0e37775ab02
SHA51220ac2b2508e931d545e952d29afa5ee8ce6600934e56ff8aee169ee2e1cb7c0d7eb1396c947edb45c31a434bd17ceada0cdfd5ea0c11ce7cc7298cbac4c9ca90
-
Filesize
137KB
MD5884d46c01c762ad6ddd2759fd921bf71
SHA1d201b130232e0ea411daa23c1ba2892fe6468712
SHA2563124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe
SHA5120acb3fe1050c1c07880ed2161956c4bee7c1e813a5fb518059b9bb88ed0bff50c108ad7b3708b6568413df4bdcc6f4d26dcd8759625a5ab77c4b26c1ba4f8813
-
Filesize
137KB
MD5884d46c01c762ad6ddd2759fd921bf71
SHA1d201b130232e0ea411daa23c1ba2892fe6468712
SHA2563124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe
SHA5120acb3fe1050c1c07880ed2161956c4bee7c1e813a5fb518059b9bb88ed0bff50c108ad7b3708b6568413df4bdcc6f4d26dcd8759625a5ab77c4b26c1ba4f8813
-
Filesize
137KB
MD5884d46c01c762ad6ddd2759fd921bf71
SHA1d201b130232e0ea411daa23c1ba2892fe6468712
SHA2563124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe
SHA5120acb3fe1050c1c07880ed2161956c4bee7c1e813a5fb518059b9bb88ed0bff50c108ad7b3708b6568413df4bdcc6f4d26dcd8759625a5ab77c4b26c1ba4f8813
-
Filesize
137KB
MD5884d46c01c762ad6ddd2759fd921bf71
SHA1d201b130232e0ea411daa23c1ba2892fe6468712
SHA2563124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe
SHA5120acb3fe1050c1c07880ed2161956c4bee7c1e813a5fb518059b9bb88ed0bff50c108ad7b3708b6568413df4bdcc6f4d26dcd8759625a5ab77c4b26c1ba4f8813
-
Filesize
137KB
MD5884d46c01c762ad6ddd2759fd921bf71
SHA1d201b130232e0ea411daa23c1ba2892fe6468712
SHA2563124fcb79da0bdf9d0d1995e37b06f7929d83c1c4b60e38c104743be71170efe
SHA5120acb3fe1050c1c07880ed2161956c4bee7c1e813a5fb518059b9bb88ed0bff50c108ad7b3708b6568413df4bdcc6f4d26dcd8759625a5ab77c4b26c1ba4f8813
-
Filesize
41KB
MD5ffa5f4b6b580d53bc311d6e5bace3110
SHA1d599ca575b995d8de971aed8a64762225bde386d
SHA2569857e40be1fb5b9b6db93dc03f96f6b3ff0ffab85af7944dddcac0e37775ab02
SHA51220ac2b2508e931d545e952d29afa5ee8ce6600934e56ff8aee169ee2e1cb7c0d7eb1396c947edb45c31a434bd17ceada0cdfd5ea0c11ce7cc7298cbac4c9ca90