Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
23/11/2023, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
plugmanzx.exe
Resource
win7-20231023-en
General
-
Target
plugmanzx.exe
-
Size
706KB
-
MD5
980746bbc209911ddbaaff46d856a78f
-
SHA1
283b8da4e00d54668ff2c98645a4f6f0853a0d35
-
SHA256
496bbeff36c20e17f2967fb96527b48ab329d1cac12347fdbd8692c46dd36786
-
SHA512
1a40fa8878e916442b7b3acb875cb80bbcb6e5810ad272d8fa8a5df4f757b392cb2ab86ec7b271df25f981914652913ccbded6c96834f84bab1eaafd07da3574
-
SSDEEP
12288:H1CFqELXGkJlaxoem1jMipixc06ycvpxHPi4ou0oTJOHBRAIMHEkjLzq:H1CFqQ2k7axoV1Ai4u069A4JdOHBRT2G
Malware Config
Extracted
nanocore
1.2.2.0
6coinc.zapto.org:6696
127.0.0.1:6696
dc5ce709-95b6-4a26-9175-16a1a8446828
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2023-09-03T02:07:11.731490736Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
6696
-
default_group
6coinc
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
dc5ce709-95b6-4a26-9175-16a1a8446828
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
6coinc.zapto.org
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DPI Subsystem = "C:\\Program Files (x86)\\DPI Subsystem\\dpiss.exe" plugmanzx.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA plugmanzx.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 2572 2360 plugmanzx.exe 29 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\DPI Subsystem\dpiss.exe plugmanzx.exe File opened for modification C:\Program Files (x86)\DPI Subsystem\dpiss.exe plugmanzx.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2712 schtasks.exe 2772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2360 plugmanzx.exe 2572 plugmanzx.exe 2572 plugmanzx.exe 2572 plugmanzx.exe 2572 plugmanzx.exe 2572 plugmanzx.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 plugmanzx.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2360 plugmanzx.exe Token: SeDebugPrivilege 2572 plugmanzx.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1336 2360 plugmanzx.exe 28 PID 2360 wrote to memory of 1336 2360 plugmanzx.exe 28 PID 2360 wrote to memory of 1336 2360 plugmanzx.exe 28 PID 2360 wrote to memory of 1336 2360 plugmanzx.exe 28 PID 2360 wrote to memory of 2572 2360 plugmanzx.exe 29 PID 2360 wrote to memory of 2572 2360 plugmanzx.exe 29 PID 2360 wrote to memory of 2572 2360 plugmanzx.exe 29 PID 2360 wrote to memory of 2572 2360 plugmanzx.exe 29 PID 2360 wrote to memory of 2572 2360 plugmanzx.exe 29 PID 2360 wrote to memory of 2572 2360 plugmanzx.exe 29 PID 2360 wrote to memory of 2572 2360 plugmanzx.exe 29 PID 2360 wrote to memory of 2572 2360 plugmanzx.exe 29 PID 2360 wrote to memory of 2572 2360 plugmanzx.exe 29 PID 2572 wrote to memory of 2712 2572 plugmanzx.exe 30 PID 2572 wrote to memory of 2712 2572 plugmanzx.exe 30 PID 2572 wrote to memory of 2712 2572 plugmanzx.exe 30 PID 2572 wrote to memory of 2712 2572 plugmanzx.exe 30 PID 2572 wrote to memory of 2772 2572 plugmanzx.exe 32 PID 2572 wrote to memory of 2772 2572 plugmanzx.exe 32 PID 2572 wrote to memory of 2772 2572 plugmanzx.exe 32 PID 2572 wrote to memory of 2772 2572 plugmanzx.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\plugmanzx.exe"C:\Users\Admin\AppData\Local\Temp\plugmanzx.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\plugmanzx.exe"C:\Users\Admin\AppData\Local\Temp\plugmanzx.exe"2⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\plugmanzx.exe"C:\Users\Admin\AppData\Local\Temp\plugmanzx.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DPI Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmpE476.tmp"3⤵
- Creates scheduled task(s)
PID:2712
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DPI Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpE679.tmp"3⤵
- Creates scheduled task(s)
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54c71cda0ae19c7af539c30611bbbdd02
SHA18729754de193c3cd41ed134d4abbd330d96efe46
SHA256557e831ec81c93c6e097b4700274935690bcdc3826dc4c72e6d0545f1efdd5fa
SHA512bc8988322d3859121c08a0f3339cc2464e716ee0c4113ea9e66f33f6f40b096e6defb4c0f48a10d43602d037bcdee2de5db0b0df7e41e17f3046d7cfe8358120
-
Filesize
1KB
MD55fea24e883e06e4df6d240dc72abf2c5
SHA1d778bf0f436141e02df4b421e8188abdcc9a84a4
SHA256e858982f4ab3c74f7a8903eea18c0f73501a77273ae38b54d5c9dec997e79a66
SHA51215afc2ffbbee14d28a5ff8dc8285d01c942147aada36fb33e31045a4e998769b51738bebe199bcad3462f918b535845a893aa2f80c84b9c795cd1fee4a327924