Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18-02-2024 16:11

General

  • Target

    TraceIndexer.exe

  • Size

    457KB

  • MD5

    07321f91bad9653b4fa737e5c993de90

  • SHA1

    9b0e7f445739825816e970205fe92adf7d3e1fc8

  • SHA256

    c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3

  • SHA512

    c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6

  • SSDEEP

    12288:RDodb27n+xNHL9mk39q8AwbtTtR9zi1mxrQYAA0jkYu6h82hE2ha:2d27nQNHL9mk39q8AwJRxrJEjk/MBhnU

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 17 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TraceIndexer.exe
    "C:\Users\Admin\AppData\Local\Temp\TraceIndexer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1508
  • C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe
    "C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe" 100 1508
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4840
  • C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe
    "C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe" 200 0
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 201 0
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\system32\WerFault.exe 209 2404
        3⤵
          PID:2804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\AsComDtSvc\ATKEX.dat

      Filesize

      132KB

      MD5

      e83af8dd173892918a785d27e1aef2a5

      SHA1

      d0ce65a13d43205b7a9c253b010fb2cea977a4b3

      SHA256

      31a63f7813c3436fec5c5493e30356da12ea4729fb1757bff877fc1a63825361

      SHA512

      884cb0ddf17ce35e6f191ddd97905781da67b8c8b4d27a87f872564e7d419df8966eadf93df5928fdc87e09aaf1eea187b621858c5bd2f6d41fb99872762acd5

    • C:\ProgramData\Microsoft\AsComDtSvc\ATKEX.dll

      Filesize

      53KB

      MD5

      ed5b3b3a04e3ccc8ddc41e0691c6af38

      SHA1

      7ab5dc0750fa4d5953bf45b9de4b5261458b69fa

      SHA256

      9b0f2a4833461caabd4d44c53c31b719c80b7f44a92cff5c0fb01d83f7fa43cb

      SHA512

      ae89fa6db3ba270e0ba1cae0d0457441500dfc78a50a40b7d3a2e3fae99529690e3aaa05c8821115a0a4e41197a4a650a2a8b25f92fbcb50eed7a639119cd8ad

    • C:\ProgramData\Microsoft\AsComDtSvc\TraceIndexer.exe

      Filesize

      457KB

      MD5

      07321f91bad9653b4fa737e5c993de90

      SHA1

      9b0e7f445739825816e970205fe92adf7d3e1fc8

      SHA256

      c81b31f8986cc40ff2d31c3bafd7abdf275826ccb5859eba8d927144e38bc7f3

      SHA512

      c065581716ac8158f657c231a48a8eff2eb215a008ca1d76215a17313b99888d9d14ccb73782d810cedaf5e8acc671deca28a9e2875a5668a03ece0e2cd8f5b6

    • memory/1508-44-0x0000000000650000-0x0000000000685000-memory.dmp

      Filesize

      212KB

    • memory/1508-2-0x0000000000650000-0x0000000000685000-memory.dmp

      Filesize

      212KB

    • memory/1508-4-0x0000000000650000-0x0000000000685000-memory.dmp

      Filesize

      212KB

    • memory/1508-0-0x0000000000E40000-0x0000000000F40000-memory.dmp

      Filesize

      1024KB

    • memory/2404-55-0x0000000000BA0000-0x0000000000BD5000-memory.dmp

      Filesize

      212KB

    • memory/2404-54-0x0000000000BA0000-0x0000000000BD5000-memory.dmp

      Filesize

      212KB

    • memory/2404-63-0x0000000000BA0000-0x0000000000BD5000-memory.dmp

      Filesize

      212KB

    • memory/2404-37-0x0000000000BA0000-0x0000000000BD5000-memory.dmp

      Filesize

      212KB

    • memory/2404-39-0x0000000000BA0000-0x0000000000BD5000-memory.dmp

      Filesize

      212KB

    • memory/2404-38-0x0000000000890000-0x0000000000891000-memory.dmp

      Filesize

      4KB

    • memory/2404-60-0x0000000000BA0000-0x0000000000BD5000-memory.dmp

      Filesize

      212KB

    • memory/2404-51-0x0000000000890000-0x0000000000891000-memory.dmp

      Filesize

      4KB

    • memory/2404-52-0x0000000000BA0000-0x0000000000BD5000-memory.dmp

      Filesize

      212KB

    • memory/2404-57-0x0000000000BA0000-0x0000000000BD5000-memory.dmp

      Filesize

      212KB

    • memory/2404-53-0x0000000000BA0000-0x0000000000BD5000-memory.dmp

      Filesize

      212KB

    • memory/2804-62-0x0000000000A60000-0x0000000000A61000-memory.dmp

      Filesize

      4KB

    • memory/2804-64-0x0000000000A60000-0x0000000000A61000-memory.dmp

      Filesize

      4KB

    • memory/4840-27-0x0000000000820000-0x0000000000855000-memory.dmp

      Filesize

      212KB

    • memory/4840-30-0x0000000000820000-0x0000000000855000-memory.dmp

      Filesize

      212KB

    • memory/4840-61-0x0000000000820000-0x0000000000855000-memory.dmp

      Filesize

      212KB

    • memory/5008-34-0x0000000001230000-0x0000000001265000-memory.dmp

      Filesize

      212KB

    • memory/5008-36-0x0000000001230000-0x0000000001265000-memory.dmp

      Filesize

      212KB