Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 02:53
Static task
static1
Behavioral task
behavioral1
Sample
cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe
Resource
win7-20230831-en
General
-
Target
cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe
-
Size
2.3MB
-
MD5
607db7333b07c16b6ca619f20c11f9d1
-
SHA1
2af8308c1a06e5ee26578a759eb8a0b384751a15
-
SHA256
cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85
-
SHA512
75f914408fb03e8521935305a4befdaf00b84fe45b55a3f306964c950fc10843b38f3f53349d245097933daff72e56a5334f4fe22fc6669bc819462d51c9461d
-
SSDEEP
24576:LNzH/3FRzJR4o7nGhAkfvhoucd27nQNHL9mk39q8AwJRxrJEjk/MBhnhHSA8a6SM:pzvdR4QWAkf0rmjkShnhHSA8T
Malware Config
Signatures
-
Detects PlugX payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2272-16-0x00000000002A0000-0x00000000002CD000-memory.dmp family_plugx behavioral1/memory/2868-35-0x0000000000380000-0x00000000003AD000-memory.dmp family_plugx behavioral1/memory/3056-41-0x0000000000510000-0x000000000053D000-memory.dmp family_plugx behavioral1/memory/2272-49-0x00000000002A0000-0x00000000002CD000-memory.dmp family_plugx behavioral1/memory/2696-51-0x0000000000370000-0x000000000039D000-memory.dmp family_plugx behavioral1/memory/3056-53-0x0000000000510000-0x000000000053D000-memory.dmp family_plugx behavioral1/memory/2696-52-0x0000000000370000-0x000000000039D000-memory.dmp family_plugx behavioral1/memory/2696-65-0x0000000000370000-0x000000000039D000-memory.dmp family_plugx behavioral1/memory/2696-66-0x0000000000370000-0x000000000039D000-memory.dmp family_plugx behavioral1/memory/2696-67-0x0000000000370000-0x000000000039D000-memory.dmp family_plugx behavioral1/memory/2696-68-0x0000000000370000-0x000000000039D000-memory.dmp family_plugx behavioral1/memory/2696-70-0x0000000000370000-0x000000000039D000-memory.dmp family_plugx behavioral1/memory/2696-73-0x0000000000370000-0x000000000039D000-memory.dmp family_plugx behavioral1/memory/2868-74-0x0000000000380000-0x00000000003AD000-memory.dmp family_plugx behavioral1/memory/1736-84-0x00000000001D0000-0x00000000001FD000-memory.dmp family_plugx behavioral1/memory/1736-86-0x00000000001D0000-0x00000000001FD000-memory.dmp family_plugx behavioral1/memory/1736-88-0x00000000001D0000-0x00000000001FD000-memory.dmp family_plugx behavioral1/memory/1736-89-0x00000000001D0000-0x00000000001FD000-memory.dmp family_plugx behavioral1/memory/1736-90-0x00000000001D0000-0x00000000001FD000-memory.dmp family_plugx behavioral1/memory/2696-91-0x0000000000370000-0x000000000039D000-memory.dmp family_plugx behavioral1/memory/1736-92-0x00000000001D0000-0x00000000001FD000-memory.dmp family_plugx -
Executes dropped EXE 3 IoCs
Processes:
ASUA.exeASUA.exeASUA.exepid process 2272 ASUA.exe 2868 ASUA.exe 3056 ASUA.exe -
Loads dropped DLL 4 IoCs
Processes:
cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exeASUA.exeASUA.exeASUA.exepid process 2096 cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe 2272 ASUA.exe 2868 ASUA.exe 3056 ASUA.exe -
Modifies registry class 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 45004600450039004500310031004300420043004400410043004100300045000000 svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
svchost.exesvchost.exepid process 2696 svchost.exe 1736 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ASUA.exeASUA.exesvchost.exesvchost.exepid process 2272 ASUA.exe 2868 ASUA.exe 2696 svchost.exe 2696 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 2696 svchost.exe 2696 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 2696 svchost.exe 2696 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 2696 svchost.exe 2696 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 2696 svchost.exe 2696 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 1736 svchost.exe 2696 svchost.exe 2696 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
svchost.exesvchost.exepid process 2696 svchost.exe 1736 svchost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
ASUA.exeASUA.exeASUA.exesvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 2272 ASUA.exe Token: SeTcbPrivilege 2272 ASUA.exe Token: SeDebugPrivilege 2868 ASUA.exe Token: SeTcbPrivilege 2868 ASUA.exe Token: SeDebugPrivilege 3056 ASUA.exe Token: SeTcbPrivilege 3056 ASUA.exe Token: SeDebugPrivilege 2696 svchost.exe Token: SeTcbPrivilege 2696 svchost.exe Token: SeDebugPrivilege 1736 svchost.exe Token: SeTcbPrivilege 1736 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exepid process 2096 cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe 2096 cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exeASUA.exesvchost.exedescription pid process target process PID 2096 wrote to memory of 2272 2096 cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe ASUA.exe PID 2096 wrote to memory of 2272 2096 cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe ASUA.exe PID 2096 wrote to memory of 2272 2096 cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe ASUA.exe PID 2096 wrote to memory of 2272 2096 cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe ASUA.exe PID 3056 wrote to memory of 2696 3056 ASUA.exe svchost.exe PID 3056 wrote to memory of 2696 3056 ASUA.exe svchost.exe PID 3056 wrote to memory of 2696 3056 ASUA.exe svchost.exe PID 3056 wrote to memory of 2696 3056 ASUA.exe svchost.exe PID 3056 wrote to memory of 2696 3056 ASUA.exe svchost.exe PID 3056 wrote to memory of 2696 3056 ASUA.exe svchost.exe PID 3056 wrote to memory of 2696 3056 ASUA.exe svchost.exe PID 3056 wrote to memory of 2696 3056 ASUA.exe svchost.exe PID 3056 wrote to memory of 2696 3056 ASUA.exe svchost.exe PID 2696 wrote to memory of 1736 2696 svchost.exe svchost.exe PID 2696 wrote to memory of 1736 2696 svchost.exe svchost.exe PID 2696 wrote to memory of 1736 2696 svchost.exe svchost.exe PID 2696 wrote to memory of 1736 2696 svchost.exe svchost.exe PID 2696 wrote to memory of 1736 2696 svchost.exe svchost.exe PID 2696 wrote to memory of 1736 2696 svchost.exe svchost.exe PID 2696 wrote to memory of 1736 2696 svchost.exe svchost.exe PID 2696 wrote to memory of 1736 2696 svchost.exe svchost.exe PID 2696 wrote to memory of 1736 2696 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe"C:\Users\Admin\AppData\Local\Temp\cba6d325bb9377038039baf24e07a2640200caa462320ec7bf273c8c5bc6bb85.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Public\wps\ASUA.exeC:\Users\Public\wps\ASUA.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\ProgramData\wpsupdate\ASUA.exe"C:\ProgramData\wpsupdate\ASUA.exe" 100 22721⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
C:\ProgramData\wpsupdate\ASUA.exe"C:\ProgramData\wpsupdate\ASUA.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 209 26963⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
112KB
MD5f519fd65520905db56fc0f25d8b638ed
SHA16b6d31c7f9162c4d41be3ab7857ffb83e7276b5c
SHA25667e9423d9b2aabcca01720dd5f043ad41e20b795014b262f9d4370d142d46324
SHA51228b0ed6927dfcd383ee02e26e6fec3cf345de2c9914a7dc7a37af16566a11e0becd9baf805de63165dc23039066126ed3c809d1e2c8d8287a2badfc2e2b6cbe5
-
Filesize
112KB
MD5f519fd65520905db56fc0f25d8b638ed
SHA16b6d31c7f9162c4d41be3ab7857ffb83e7276b5c
SHA25667e9423d9b2aabcca01720dd5f043ad41e20b795014b262f9d4370d142d46324
SHA51228b0ed6927dfcd383ee02e26e6fec3cf345de2c9914a7dc7a37af16566a11e0becd9baf805de63165dc23039066126ed3c809d1e2c8d8287a2badfc2e2b6cbe5
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
112KB
MD5f519fd65520905db56fc0f25d8b638ed
SHA16b6d31c7f9162c4d41be3ab7857ffb83e7276b5c
SHA25667e9423d9b2aabcca01720dd5f043ad41e20b795014b262f9d4370d142d46324
SHA51228b0ed6927dfcd383ee02e26e6fec3cf345de2c9914a7dc7a37af16566a11e0becd9baf805de63165dc23039066126ed3c809d1e2c8d8287a2badfc2e2b6cbe5
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
Filesize
33KB
MD5ae8091b6a252a2c34033eaac7e1001d6
SHA1f2de8d84d51a1cbb9f0100f94361c13a341f7163
SHA256ff6557980fac2ca2905eab34746eab8dde4aca4f8870e6c21a0d472969885542
SHA512616c4880a638b2a3ac7c55f475e27f187e21a87d0cbfd4c244a09792c1ef79692db06d92236d6aab3f31c42922af897165dde1a2741de63ae686cced5277c8ed