Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 18:10
Static task
static1
Behavioral task
behavioral1
Sample
PLV.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
PLV.exe
Resource
win10v2004-20230915-en
General
-
Target
PLV.exe
-
Size
5.4MB
-
MD5
ac5a067a49c0347a26cb08dbf77f45b2
-
SHA1
961323bf26e320183019c6a759373017fa1d1ec2
-
SHA256
c89c74a42dc7e8ba62490a3f73f031caec9ec3579bc69d169abc2bfd2e3719d2
-
SHA512
fecabc22397856af602384d99f017ecb2b3624d96ae6fcc95f34b860fcb8b4c94c6e957b120762499ea72de7ca9b0e628252196093ec12f57b176641b8c00d94
-
SSDEEP
98304:cAWVhcggbXvZnyKbxK0UiIeYjRJFpFx9e+11:cHyLKN/eeRJpHv1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 1032 created 3324 1032 PLV.exe 39 PID 1032 created 3324 1032 PLV.exe 39 PID 1032 created 3324 1032 PLV.exe 39 PID 1032 created 3324 1032 PLV.exe 39 PID 1032 created 3324 1032 PLV.exe 39 PID 1032 created 3324 1032 PLV.exe 39 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts PLV.exe -
Stops running service(s) 3 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1032 set thread context of 400 1032 PLV.exe 108 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3432 sc.exe 540 sc.exe 3404 sc.exe 3112 sc.exe 1076 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1032 PLV.exe 1032 PLV.exe 4580 powershell.exe 4580 powershell.exe 1032 PLV.exe 1032 PLV.exe 1032 PLV.exe 1032 PLV.exe 1032 PLV.exe 1032 PLV.exe 1032 PLV.exe 1032 PLV.exe 400 dialer.exe 400 dialer.exe 1032 PLV.exe 1032 PLV.exe 400 dialer.exe 400 dialer.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 744 Process not Found 1508 Process not Found 2564 Process not Found 2896 Process not Found 3432 Process not Found 2528 Process not Found 540 Process not Found 3136 Process not Found 3688 Process not Found 1648 Process not Found 2608 Process not Found 996 Process not Found 2520 Process not Found 4676 Process not Found 2828 Process not Found 2196 Process not Found 4808 Process not Found 4804 Process not Found 4668 Process not Found 1732 Process not Found 4244 Process not Found 4232 Process not Found 4796 Process not Found 4452 Process not Found 2892 Process not Found 3504 Process not Found 3444 Process not Found 4960 Process not Found 452 Process not Found 912 Process not Found 5024 Process not Found 5060 Process not Found 4152 Process not Found 3744 Process not Found 2952 Process not Found 4164 Process not Found 5020 Process not Found 4836 Process not Found 3704 Process not Found 5072 Process not Found 1080 Process not Found 3596 Process not Found 5036 Process not Found 4408 Process not Found 1976 Process not Found 3980 Process not Found 3624 Process not Found 4464 Process not Found 1832 Process not Found 4200 Process not Found 4832 Process not Found 904 Process not Found 684 Process not Found 1468 Process not Found 2452 Process not Found 760 Process not Found 3920 Process not Found 3836 Process not Found 2584 Process not Found 4652 Process not Found 3736 Process not Found 3824 Process not Found 1332 Process not Found 888 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4580 powershell.exe Token: SeDebugPrivilege 400 dialer.exe Token: SeShutdownPrivilege 4808 powercfg.exe Token: SeCreatePagefilePrivilege 4808 powercfg.exe Token: SeShutdownPrivilege 4876 powercfg.exe Token: SeCreatePagefilePrivilege 4876 powercfg.exe Token: SeShutdownPrivilege 4236 powercfg.exe Token: SeCreatePagefilePrivilege 4236 powercfg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2032 wrote to memory of 3404 2032 cmd.exe 101 PID 2032 wrote to memory of 3404 2032 cmd.exe 101 PID 2032 wrote to memory of 3112 2032 cmd.exe 102 PID 2032 wrote to memory of 3112 2032 cmd.exe 102 PID 2032 wrote to memory of 1076 2032 cmd.exe 103 PID 2032 wrote to memory of 1076 2032 cmd.exe 103 PID 2032 wrote to memory of 3432 2032 cmd.exe 104 PID 2032 wrote to memory of 3432 2032 cmd.exe 104 PID 2032 wrote to memory of 540 2032 cmd.exe 105 PID 2032 wrote to memory of 540 2032 cmd.exe 105 PID 1032 wrote to memory of 400 1032 PLV.exe 108 PID 2076 wrote to memory of 4808 2076 cmd.exe 111 PID 2076 wrote to memory of 4808 2076 cmd.exe 111 PID 2076 wrote to memory of 4876 2076 cmd.exe 113 PID 2076 wrote to memory of 4876 2076 cmd.exe 113 PID 2076 wrote to memory of 4236 2076 cmd.exe 115 PID 2076 wrote to memory of 4236 2076 cmd.exe 115 PID 2076 wrote to memory of 452 2076 cmd.exe 116 PID 2076 wrote to memory of 452 2076 cmd.exe 116 PID 400 wrote to memory of 604 400 dialer.exe 78 PID 400 wrote to memory of 668 400 dialer.exe 1 PID 400 wrote to memory of 944 400 dialer.exe 73 PID 400 wrote to memory of 1020 400 dialer.exe 3 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 400 wrote to memory of 436 400 dialer.exe 72 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 400 wrote to memory of 832 400 dialer.exe 70 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 400 wrote to memory of 1040 400 dialer.exe 69 PID 400 wrote to memory of 1056 400 dialer.exe 68 PID 400 wrote to memory of 1140 400 dialer.exe 4 PID 400 wrote to memory of 1196 400 dialer.exe 5 PID 400 wrote to memory of 1220 400 dialer.exe 67 PID 400 wrote to memory of 1316 400 dialer.exe 66 PID 400 wrote to memory of 1372 400 dialer.exe 65 PID 400 wrote to memory of 1396 400 dialer.exe 64 PID 400 wrote to memory of 1408 400 dialer.exe 6 PID 400 wrote to memory of 1448 400 dialer.exe 63 PID 1372 wrote to memory of 1336 1372 svchost.exe 121 PID 1372 wrote to memory of 1336 1372 svchost.exe 121 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2384 668 lsass.exe 48 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 PID 668 wrote to memory of 2512 668 lsass.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:668
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:1020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1196
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1408
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\PLV.exe"C:\Users\Admin\AppData\Local\Temp\PLV.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3404
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:3112
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1076
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3432
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:540
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:452
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:400
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateForcefully"2⤵PID:3444
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateForcefully" /xml "C:\Users\Admin\AppData\Local\Temp\iwzulyohcyoo.xml"2⤵
- Creates scheduled task(s)
PID:4960
-
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1336
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1220
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1056
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1040
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:832
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:944
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD584ee42fe9a79a7eb9c9f96ab678af294
SHA162406990bcda0de8354575147aa07161be1ab194
SHA2561e806c8c561abb9100a544eca8894f0c9b98f0859d92b277b6b511125f5c7427
SHA51278ca886963a281e1164d6baebc285f62724b2a160d060b3bec43b5e0df0c6a13b58b36339318993e1306e86360ed591f2d2ffdf4af3f46b0aceacf9cbee66710