Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2024 16:11

General

  • Target

    TraceIndexer.exe

  • Size

    457KB

  • MD5

    07321f91bad9653b4fa737e5c993de90

  • SHA1

    9b0e7f445739825816e970205fe92adf7d3e1fc8

  • SHA256

    c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3

  • SHA512

    c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6

  • SSDEEP

    12288:RDodb27n+xNHL9mk39q8AwbtTtR9zi1mxrQYAA0jkYu6h82hE2ha:2d27nQNHL9mk39q8AwJRxrJEjk/MBhnU

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 11 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TraceIndexer.exe
    "C:\Users\Admin\AppData\Local\Temp\TraceIndexer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2088
  • C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe
    "C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe" 100 2088
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2712
  • C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe
    "C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe" 200 0
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 201 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\AsComDtSvc\ATKEX.dat

    Filesize

    132KB

    MD5

    e83af8dd173892918a785d27e1aef2a5

    SHA1

    d0ce65a13d43205b7a9c253b010fb2cea977a4b3

    SHA256

    31a63f7813c3436fec5c5493e30356da12ea4729fb1757bff877fc1a63825361

    SHA512

    884cb0ddf17ce35e6f191ddd97905781da67b8c8b4d27a87f872564e7d419df8966eadf93df5928fdc87e09aaf1eea187b621858c5bd2f6d41fb99872762acd5

  • C:\ProgramData\Microsoft\AsComDtSvc\ATKEX.dll

    Filesize

    53KB

    MD5

    ed5b3b3a04e3ccc8ddc41e0691c6af38

    SHA1

    7ab5dc0750fa4d5953bf45b9de4b5261458b69fa

    SHA256

    9b0f2a4833461caabd4d44c53c31b719c80b7f44a92cff5c0fb01d83f7fa43cb

    SHA512

    ae89fa6db3ba270e0ba1cae0d0457441500dfc78a50a40b7d3a2e3fae99529690e3aaa05c8821115a0a4e41197a4a650a2a8b25f92fbcb50eed7a639119cd8ad

  • C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe

    Filesize

    457KB

    MD5

    07321f91bad9653b4fa737e5c993de90

    SHA1

    9b0e7f445739825816e970205fe92adf7d3e1fc8

    SHA256

    c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3

    SHA512

    c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6

  • memory/1328-45-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/1328-44-0x0000000000170000-0x00000000001A5000-memory.dmp

    Filesize

    212KB

  • memory/1328-47-0x0000000000170000-0x00000000001A5000-memory.dmp

    Filesize

    212KB

  • memory/1328-46-0x0000000000170000-0x00000000001A5000-memory.dmp

    Filesize

    212KB

  • memory/1328-42-0x00000000000C0000-0x00000000000C2000-memory.dmp

    Filesize

    8KB

  • memory/1328-40-0x00000000000A0000-0x00000000000C0000-memory.dmp

    Filesize

    128KB

  • memory/1328-36-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2088-0-0x0000000000890000-0x0000000000990000-memory.dmp

    Filesize

    1024KB

  • memory/2088-4-0x00000000000E0000-0x0000000000115000-memory.dmp

    Filesize

    212KB

  • memory/2088-2-0x00000000000E0000-0x0000000000115000-memory.dmp

    Filesize

    212KB

  • memory/2088-54-0x00000000000E0000-0x0000000000115000-memory.dmp

    Filesize

    212KB

  • memory/2672-34-0x0000000000150000-0x0000000000185000-memory.dmp

    Filesize

    212KB

  • memory/2672-48-0x0000000000150000-0x0000000000185000-memory.dmp

    Filesize

    212KB

  • memory/2712-28-0x0000000000200000-0x0000000000235000-memory.dmp

    Filesize

    212KB

  • memory/2712-26-0x0000000000200000-0x0000000000235000-memory.dmp

    Filesize

    212KB

  • memory/2712-57-0x0000000000200000-0x0000000000235000-memory.dmp

    Filesize

    212KB