Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-02-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
ATKEX.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ATKEX.dll
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
ATKEX.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
ATKEX.dll
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
TraceIndexer.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
TraceIndexer.exe
Resource
win10-20240214-en
Behavioral task
behavioral7
Sample
TraceIndexer.exe
Resource
win10v2004-20231215-en
General
-
Target
TraceIndexer.exe
-
Size
457KB
-
MD5
07321f91bad9653b4fa737e5c993de90
-
SHA1
9b0e7f445739825816e970205fe92adf7d3e1fc8
-
SHA256
c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
-
SHA512
c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6
-
SSDEEP
12288:RDodb27n+xNHL9mk39q8AwbtTtR9zi1mxrQYAA0jkYu6h82hE2ha:2d27nQNHL9mk39q8AwJRxrJEjk/MBhnU
Malware Config
Signatures
-
Detects PlugX payload 11 IoCs
resource yara_rule behavioral5/memory/2088-2-0x00000000000E0000-0x0000000000115000-memory.dmp family_plugx behavioral5/memory/2088-4-0x00000000000E0000-0x0000000000115000-memory.dmp family_plugx behavioral5/memory/2712-26-0x0000000000200000-0x0000000000235000-memory.dmp family_plugx behavioral5/memory/2712-28-0x0000000000200000-0x0000000000235000-memory.dmp family_plugx behavioral5/memory/2672-34-0x0000000000150000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1328-44-0x0000000000170000-0x00000000001A5000-memory.dmp family_plugx behavioral5/memory/2672-48-0x0000000000150000-0x0000000000185000-memory.dmp family_plugx behavioral5/memory/1328-46-0x0000000000170000-0x00000000001A5000-memory.dmp family_plugx behavioral5/memory/1328-47-0x0000000000170000-0x00000000001A5000-memory.dmp family_plugx behavioral5/memory/2088-54-0x00000000000E0000-0x0000000000115000-memory.dmp family_plugx behavioral5/memory/2712-57-0x0000000000200000-0x0000000000235000-memory.dmp family_plugx -
Deletes itself 1 IoCs
pid Process 2712 TraceIndexer.exe -
Executes dropped EXE 2 IoCs
pid Process 2712 TraceIndexer.exe 2672 TraceIndexer.exe -
Loads dropped DLL 2 IoCs
pid Process 2712 TraceIndexer.exe 2672 TraceIndexer.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2088 TraceIndexer.exe 2088 TraceIndexer.exe 2712 TraceIndexer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2088 TraceIndexer.exe Token: SeTcbPrivilege 2088 TraceIndexer.exe Token: SeDebugPrivilege 2712 TraceIndexer.exe Token: SeTcbPrivilege 2712 TraceIndexer.exe Token: SeDebugPrivilege 2672 TraceIndexer.exe Token: SeTcbPrivilege 2672 TraceIndexer.exe Token: SeDebugPrivilege 1328 svchost.exe Token: SeTcbPrivilege 1328 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1328 2672 TraceIndexer.exe 31 PID 2672 wrote to memory of 1328 2672 TraceIndexer.exe 31 PID 2672 wrote to memory of 1328 2672 TraceIndexer.exe 31 PID 2672 wrote to memory of 1328 2672 TraceIndexer.exe 31 PID 2672 wrote to memory of 1328 2672 TraceIndexer.exe 31 PID 2672 wrote to memory of 1328 2672 TraceIndexer.exe 31 PID 2672 wrote to memory of 1328 2672 TraceIndexer.exe 31 PID 2672 wrote to memory of 1328 2672 TraceIndexer.exe 31 PID 2672 wrote to memory of 1328 2672 TraceIndexer.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\TraceIndexer.exe"C:\Users\Admin\AppData\Local\Temp\TraceIndexer.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe"C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe" 100 20881⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe"C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5e83af8dd173892918a785d27e1aef2a5
SHA1d0ce65a13d43205b7a9c253b010fb2cea977a4b3
SHA25631a63f7813c3436fec5c5493e30356da12ea4729fb1757bff877fc1a63825361
SHA512884cb0ddf17ce35e6f191ddd97905781da67b8c8b4d27a87f872564e7d419df8966eadf93df5928fdc87e09aaf1eea187b621858c5bd2f6d41fb99872762acd5
-
Filesize
53KB
MD5ed5b3b3a04e3ccc8ddc41e0691c6af38
SHA17ab5dc0750fa4d5953bf45b9de4b5261458b69fa
SHA2569b0f2a4833461caabd4d44c53c31b719c80b7f44a92cff5c0fb01d83f7fa43cb
SHA512ae89fa6db3ba270e0ba1cae0d0457441500dfc78a50a40b7d3a2e3fae99529690e3aaa05c8821115a0a4e41197a4a650a2a8b25f92fbcb50eed7a639119cd8ad
-
Filesize
457KB
MD507321f91bad9653b4fa737e5c993de90
SHA19b0e7f445739825816e970205fe92adf7d3e1fc8
SHA256c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3
SHA512c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6