Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 18:10

General

  • Target

    PLV.exe

  • Size

    5.4MB

  • MD5

    ac5a067a49c0347a26cb08dbf77f45b2

  • SHA1

    961323bf26e320183019c6a759373017fa1d1ec2

  • SHA256

    c89c74a42dc7e8ba62490a3f73f031caec9ec3579bc69d169abc2bfd2e3719d2

  • SHA512

    fecabc22397856af602384d99f017ecb2b3624d96ae6fcc95f34b860fcb8b4c94c6e957b120762499ea72de7ca9b0e628252196093ec12f57b176641b8c00d94

  • SSDEEP

    98304:cAWVhcggbXvZnyKbxK0UiIeYjRJFpFx9e+11:cHyLKN/eeRJpHv1

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:476
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
      • Drops file in System32 directory
      PID:468
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
        PID:420
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1348
          • C:\Users\Admin\AppData\Local\Temp\PLV.exe
            "C:\Users\Admin\AppData\Local\Temp\PLV.exe"
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Drops file in Drivers directory
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2208
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
            2⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2068
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1092
            • C:\Windows\System32\sc.exe
              sc stop UsoSvc
              3⤵
              • Launches sc.exe
              PID:2608
            • C:\Windows\System32\sc.exe
              sc stop WaaSMedicSvc
              3⤵
              • Launches sc.exe
              PID:2672
            • C:\Windows\System32\sc.exe
              sc stop wuauserv
              3⤵
              • Launches sc.exe
              PID:2684
            • C:\Windows\System32\sc.exe
              sc stop bits
              3⤵
              • Launches sc.exe
              PID:2708
            • C:\Windows\System32\sc.exe
              sc stop dosvc
              3⤵
              • Launches sc.exe
              PID:2616
          • C:\Windows\System32\cmd.exe
            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2568
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2880
            • C:\Windows\System32\powercfg.exe
              powercfg /x -hibernate-timeout-dc 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2744
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-ac 0
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1428
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-dc 0
              3⤵
                PID:552
            • C:\Windows\System32\dialer.exe
              C:\Windows\System32\dialer.exe
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2592
            • C:\Windows\System32\schtasks.exe
              C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateForcefully"
              2⤵
                PID:2472
              • C:\Windows\System32\schtasks.exe
                C:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateForcefully" /xml "C:\Users\Admin\AppData\Local\Temp\iwzulyohcyoo.xml"
                2⤵
                • Creates scheduled task(s)
                PID:800
            • C:\Windows\system32\Dwm.exe
              "C:\Windows\system32\Dwm.exe"
              1⤵
                PID:1392
              • C:\Windows\system32\csrss.exe
                %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
                1⤵
                • Enumerates system info in registry
                • Suspicious use of WriteProcessMemory
                PID:2764
              • C:\Windows\system32\winlogon.exe
                winlogon.exe
                1⤵
                • Modifies data under HKEY_USERS
                • Suspicious use of WriteProcessMemory
                PID:2004
                • C:\Windows\system32\LogonUI.exe
                  "LogonUI.exe" /flags:0x0
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1900

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\iwzulyohcyoo.xml

                Filesize

                1KB

                MD5

                84ee42fe9a79a7eb9c9f96ab678af294

                SHA1

                62406990bcda0de8354575147aa07161be1ab194

                SHA256

                1e806c8c561abb9100a544eca8894f0c9b98f0859d92b277b6b511125f5c7427

                SHA512

                78ca886963a281e1164d6baebc285f62724b2a160d060b3bec43b5e0df0c6a13b58b36339318993e1306e86360ed591f2d2ffdf4af3f46b0aceacf9cbee66710

              • memory/420-22-0x0000000000850000-0x000000000087B000-memory.dmp

                Filesize

                172KB

              • memory/420-19-0x0000000000820000-0x0000000000844000-memory.dmp

                Filesize

                144KB

              • memory/420-20-0x0000000000850000-0x000000000087B000-memory.dmp

                Filesize

                172KB

              • memory/420-18-0x0000000000820000-0x0000000000844000-memory.dmp

                Filesize

                144KB

              • memory/420-21-0x000007FEBF720000-0x000007FEBF730000-memory.dmp

                Filesize

                64KB

              • memory/468-51-0x0000000000120000-0x000000000014B000-memory.dmp

                Filesize

                172KB

              • memory/468-41-0x00000000776D1000-0x00000000776D2000-memory.dmp

                Filesize

                4KB

              • memory/468-30-0x0000000000120000-0x000000000014B000-memory.dmp

                Filesize

                172KB

              • memory/468-34-0x00000000376C0000-0x00000000376D0000-memory.dmp

                Filesize

                64KB

              • memory/468-32-0x000007FEBF720000-0x000007FEBF730000-memory.dmp

                Filesize

                64KB

              • memory/476-35-0x00000000004E0000-0x000000000050B000-memory.dmp

                Filesize

                172KB

              • memory/476-40-0x00000000376C0000-0x00000000376D0000-memory.dmp

                Filesize

                64KB

              • memory/476-46-0x00000000004E0000-0x000000000050B000-memory.dmp

                Filesize

                172KB

              • memory/476-39-0x000007FEBF720000-0x000007FEBF730000-memory.dmp

                Filesize

                64KB

              • memory/476-52-0x00000000004E0000-0x000000000050B000-memory.dmp

                Filesize

                172KB

              • memory/1900-53-0x0000000002760000-0x0000000002761000-memory.dmp

                Filesize

                4KB

              • memory/1900-50-0x0000000002760000-0x0000000002761000-memory.dmp

                Filesize

                4KB

              • memory/2068-9-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

                Filesize

                9.6MB

              • memory/2068-8-0x00000000026D0000-0x0000000002750000-memory.dmp

                Filesize

                512KB

              • memory/2068-10-0x00000000026D0000-0x0000000002750000-memory.dmp

                Filesize

                512KB

              • memory/2068-7-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

                Filesize

                9.6MB

              • memory/2068-11-0x000007FEF5870000-0x000007FEF620D000-memory.dmp

                Filesize

                9.6MB

              • memory/2068-6-0x0000000002460000-0x0000000002468000-memory.dmp

                Filesize

                32KB

              • memory/2068-5-0x000000001B1D0000-0x000000001B4B2000-memory.dmp

                Filesize

                2.9MB

              • memory/2208-25-0x000000013F1A0000-0x000000013F709000-memory.dmp

                Filesize

                5.4MB

              • memory/2208-0-0x000000013F1A0000-0x000000013F709000-memory.dmp

                Filesize

                5.4MB

              • memory/2208-43-0x000000013F1A0000-0x000000013F709000-memory.dmp

                Filesize

                5.4MB

              • memory/2592-15-0x0000000077680000-0x0000000077829000-memory.dmp

                Filesize

                1.7MB

              • memory/2592-47-0x0000000077680000-0x0000000077829000-memory.dmp

                Filesize

                1.7MB

              • memory/2592-36-0x0000000140000000-0x000000014002B000-memory.dmp

                Filesize

                172KB

              • memory/2592-17-0x0000000077560000-0x000000007767F000-memory.dmp

                Filesize

                1.1MB