Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2023, 18:10

General

  • Target

    PLV.exe

  • Size

    5.4MB

  • MD5

    ac5a067a49c0347a26cb08dbf77f45b2

  • SHA1

    961323bf26e320183019c6a759373017fa1d1ec2

  • SHA256

    c89c74a42dc7e8ba62490a3f73f031caec9ec3579bc69d169abc2bfd2e3719d2

  • SHA512

    fecabc22397856af602384d99f017ecb2b3624d96ae6fcc95f34b860fcb8b4c94c6e957b120762499ea72de7ca9b0e628252196093ec12f57b176641b8c00d94

  • SSDEEP

    98304:cAWVhcggbXvZnyKbxK0UiIeYjRJFpFx9e+11:cHyLKN/eeRJpHv1

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:668
  • C:\Windows\system32\dwm.exe
    "dwm.exe"
    1⤵
      PID:1020
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
      1⤵
        PID:1140
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
        1⤵
          PID:1196
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
          1⤵
            PID:1408
          • C:\Windows\Explorer.EXE
            C:\Windows\Explorer.EXE
            1⤵
              PID:3324
              • C:\Users\Admin\AppData\Local\Temp\PLV.exe
                "C:\Users\Admin\AppData\Local\Temp\PLV.exe"
                2⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Drops file in Drivers directory
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:1032
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4580
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2032
                • C:\Windows\System32\sc.exe
                  sc stop UsoSvc
                  3⤵
                  • Launches sc.exe
                  PID:3404
                • C:\Windows\System32\sc.exe
                  sc stop WaaSMedicSvc
                  3⤵
                  • Launches sc.exe
                  PID:3112
                • C:\Windows\System32\sc.exe
                  sc stop wuauserv
                  3⤵
                  • Launches sc.exe
                  PID:1076
                • C:\Windows\System32\sc.exe
                  sc stop bits
                  3⤵
                  • Launches sc.exe
                  PID:3432
                • C:\Windows\System32\sc.exe
                  sc stop dosvc
                  3⤵
                  • Launches sc.exe
                  PID:540
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2076
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -hibernate-timeout-ac 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4808
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -hibernate-timeout-dc 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4876
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -standby-timeout-ac 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4236
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -standby-timeout-dc 0
                  3⤵
                    PID:452
                • C:\Windows\System32\dialer.exe
                  C:\Windows\System32\dialer.exe
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:400
                • C:\Windows\System32\schtasks.exe
                  C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateForcefully"
                  2⤵
                    PID:3444
                  • C:\Windows\System32\schtasks.exe
                    C:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateForcefully" /xml "C:\Users\Admin\AppData\Local\Temp\iwzulyohcyoo.xml"
                    2⤵
                    • Creates scheduled task(s)
                    PID:4960
                • C:\Windows\sysmon.exe
                  C:\Windows\sysmon.exe
                  1⤵
                    PID:2512
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                    1⤵
                      PID:2384
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                      1⤵
                        PID:1448
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                        1⤵
                          PID:1396
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                          1⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1372
                          • C:\Windows\system32\sihost.exe
                            sihost.exe
                            2⤵
                              PID:1336
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                            1⤵
                              PID:1316
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                              1⤵
                                PID:1220
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                1⤵
                                  PID:1056
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                  1⤵
                                    PID:1040
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                    1⤵
                                      PID:832
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                      1⤵
                                        PID:436
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                        1⤵
                                          PID:944
                                        • C:\Windows\system32\winlogon.exe
                                          winlogon.exe
                                          1⤵
                                            PID:604

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1r4nulst.42h.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\iwzulyohcyoo.xml

                                            Filesize

                                            1KB

                                            MD5

                                            84ee42fe9a79a7eb9c9f96ab678af294

                                            SHA1

                                            62406990bcda0de8354575147aa07161be1ab194

                                            SHA256

                                            1e806c8c561abb9100a544eca8894f0c9b98f0859d92b277b6b511125f5c7427

                                            SHA512

                                            78ca886963a281e1164d6baebc285f62724b2a160d060b3bec43b5e0df0c6a13b58b36339318993e1306e86360ed591f2d2ffdf4af3f46b0aceacf9cbee66710

                                          • memory/400-20-0x00007FFA73840000-0x00007FFA738FE000-memory.dmp

                                            Filesize

                                            760KB

                                          • memory/400-89-0x00007FF7BCC00000-0x00007FF7BCC2B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/400-19-0x00007FFA757F0000-0x00007FFA759E5000-memory.dmp

                                            Filesize

                                            2.0MB

                                          • memory/436-43-0x00000213A30D0000-0x00000213A30FB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/436-46-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/436-50-0x00000213A30D0000-0x00000213A30FB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/604-28-0x00000219AF960000-0x00000219AF98B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/604-74-0x00000219AF960000-0x00000219AF98B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/604-25-0x00000219AF530000-0x00000219AF554000-memory.dmp

                                            Filesize

                                            144KB

                                          • memory/604-31-0x00007FFA7588D000-0x00007FFA7588E000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/604-34-0x00007FFA7588F000-0x00007FFA75890000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/604-87-0x00000219AF960000-0x00000219AF98B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/604-86-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/668-44-0x00007FFA7588F000-0x00007FFA75890000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/668-30-0x000002322F5D0000-0x000002322F5FB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/668-32-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/668-45-0x00007FFA7588C000-0x00007FFA7588D000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/668-39-0x000002322F5D0000-0x000002322F5FB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/668-41-0x00007FFA7588D000-0x00007FFA7588E000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/832-56-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/832-55-0x0000022D2BBB0000-0x0000022D2BBDB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/832-117-0x0000022D2BBB0000-0x0000022D2BBDB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/944-40-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/944-35-0x0000025E623D0000-0x0000025E623FB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/944-47-0x0000025E623D0000-0x0000025E623FB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1020-99-0x000002790A960000-0x000002790A98B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1020-37-0x000002790A960000-0x000002790A98B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1020-49-0x000002790A960000-0x000002790A98B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1020-98-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1032-0-0x00007FF6CC5C0000-0x00007FF6CCB29000-memory.dmp

                                            Filesize

                                            5.4MB

                                          • memory/1032-24-0x00007FF6CC5C0000-0x00007FF6CCB29000-memory.dmp

                                            Filesize

                                            5.4MB

                                          • memory/1040-62-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1040-120-0x0000022EBB260000-0x0000022EBB28B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1040-58-0x0000022EBB260000-0x0000022EBB28B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1056-63-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1056-61-0x000002BAE5D70000-0x000002BAE5D9B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1056-118-0x000002BAE5D70000-0x000002BAE5D9B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1140-65-0x000002A9BCCB0000-0x000002A9BCCDB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1140-119-0x000002A9BCCB0000-0x000002A9BCCDB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1140-68-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1196-73-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1196-72-0x0000018885E00000-0x0000018885E2B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1196-121-0x0000018885E00000-0x0000018885E2B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1220-79-0x0000023B0F080000-0x0000023B0F0AB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1220-123-0x0000023B0F080000-0x0000023B0F0AB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1220-81-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1316-83-0x000001F4B2030000-0x000001F4B205B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1316-122-0x000001F4B2030000-0x000001F4B205B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1316-88-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1372-94-0x00007FFA35870000-0x00007FFA35880000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1372-110-0x000001E724D10000-0x000001E724D3B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1372-90-0x000001E724D10000-0x000001E724D3B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1396-113-0x0000021DCBD80000-0x0000021DCBDAB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1396-96-0x0000021DCBD80000-0x0000021DCBDAB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1408-115-0x00000232582E0000-0x000002325830B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/1448-116-0x0000027CC77A0000-0x0000027CC77CB000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/4580-12-0x000001C9F0210000-0x000001C9F0220000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/4580-11-0x00007FFA555C0000-0x00007FFA56081000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/4580-13-0x000001C9F0210000-0x000001C9F0220000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/4580-16-0x00007FFA555C0000-0x00007FFA56081000-memory.dmp

                                            Filesize

                                            10.8MB

                                          • memory/4580-10-0x000001C9F0150000-0x000001C9F0172000-memory.dmp

                                            Filesize

                                            136KB