Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-02-2024 16:09
Static task
static1
Behavioral task
behavioral1
Sample
LZMA.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
LZMA.exe
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
LZMA.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
LZMA.exe
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
expatai.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
expatai.dll
Resource
win10-20240214-en
Behavioral task
behavioral7
Sample
expatai.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
expatai.dll
Resource
win11-20240214-en
General
-
Target
LZMA.exe
-
Size
388KB
-
MD5
89266366e2c712e8b47b2b9ed30d60b7
-
SHA1
a94bb0440fe6c0d7a6c102037561ffbe6203a251
-
SHA256
f7369777a4fee1b2e8282f30dc355c3216e4fdc7018912f2a7444026f9edafd0
-
SHA512
385916c9bbc9a4d7474bfcc68c4fb281e2f3d6df5c11a114b8646400f8a822a5c945f80de2d8d97547e58971b03bcada2f28fc2f259db07ea1880b3fa68b3d95
-
SSDEEP
12288:1PzUcyOjaTbV7DWZzZg1iuc30Oy7CxMFr:Vz1y6AbV+qwEr
Malware Config
Signatures
-
Detects PlugX payload 25 IoCs
resource yara_rule behavioral1/memory/2932-1-0x00000000008D0000-0x00000000008FD000-memory.dmp family_plugx behavioral1/memory/2932-2-0x00000000008D0000-0x00000000008FD000-memory.dmp family_plugx behavioral1/memory/1760-20-0x00000000008A0000-0x00000000008CD000-memory.dmp family_plugx behavioral1/memory/1760-21-0x00000000008A0000-0x00000000008CD000-memory.dmp family_plugx behavioral1/memory/2884-25-0x0000000000160000-0x000000000018D000-memory.dmp family_plugx behavioral1/memory/2884-26-0x0000000000160000-0x000000000018D000-memory.dmp family_plugx behavioral1/memory/2832-36-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/2884-38-0x0000000000160000-0x000000000018D000-memory.dmp family_plugx behavioral1/memory/2832-39-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/2932-43-0x00000000008D0000-0x00000000008FD000-memory.dmp family_plugx behavioral1/memory/2832-51-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/2832-52-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/2832-53-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/2832-54-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/2832-57-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/2832-58-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/1760-62-0x00000000008A0000-0x00000000008CD000-memory.dmp family_plugx behavioral1/memory/2472-69-0x00000000001A0000-0x00000000001CD000-memory.dmp family_plugx behavioral1/memory/2472-70-0x00000000001A0000-0x00000000001CD000-memory.dmp family_plugx behavioral1/memory/2472-73-0x00000000001A0000-0x00000000001CD000-memory.dmp family_plugx behavioral1/memory/2472-74-0x00000000001A0000-0x00000000001CD000-memory.dmp family_plugx behavioral1/memory/2472-75-0x00000000001A0000-0x00000000001CD000-memory.dmp family_plugx behavioral1/memory/2832-76-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/2472-77-0x00000000001F0000-0x000000000021D000-memory.dmp family_plugx behavioral1/memory/2472-78-0x00000000001A0000-0x00000000001CD000-memory.dmp family_plugx -
Deletes itself 1 IoCs
pid Process 1760 LZMA.exe -
Executes dropped EXE 2 IoCs
pid Process 1760 LZMA.exe 2884 LZMA.exe -
Loads dropped DLL 2 IoCs
pid Process 1760 LZMA.exe 2884 LZMA.exe -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 182.16.12.250 Destination IP 182.16.12.250 Destination IP 182.16.12.250 -
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 41003400360042003700420038003900460039003900420043003500330036000000 svchost.exe Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2832 svchost.exe 2472 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2932 LZMA.exe 2932 LZMA.exe 1760 LZMA.exe 2832 svchost.exe 2832 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2832 svchost.exe 2832 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2832 svchost.exe 2832 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2832 svchost.exe 2832 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2832 svchost.exe 2832 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2472 svchost.exe 2832 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2832 svchost.exe 2472 svchost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2932 LZMA.exe Token: SeTcbPrivilege 2932 LZMA.exe Token: SeDebugPrivilege 1760 LZMA.exe Token: SeTcbPrivilege 1760 LZMA.exe Token: SeDebugPrivilege 2884 LZMA.exe Token: SeTcbPrivilege 2884 LZMA.exe Token: SeDebugPrivilege 2832 svchost.exe Token: SeTcbPrivilege 2832 svchost.exe Token: SeDebugPrivilege 2472 svchost.exe Token: SeTcbPrivilege 2472 svchost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2832 2884 LZMA.exe 33 PID 2884 wrote to memory of 2832 2884 LZMA.exe 33 PID 2884 wrote to memory of 2832 2884 LZMA.exe 33 PID 2884 wrote to memory of 2832 2884 LZMA.exe 33 PID 2884 wrote to memory of 2832 2884 LZMA.exe 33 PID 2884 wrote to memory of 2832 2884 LZMA.exe 33 PID 2884 wrote to memory of 2832 2884 LZMA.exe 33 PID 2884 wrote to memory of 2832 2884 LZMA.exe 33 PID 2884 wrote to memory of 2832 2884 LZMA.exe 33 PID 2832 wrote to memory of 2472 2832 svchost.exe 34 PID 2832 wrote to memory of 2472 2832 svchost.exe 34 PID 2832 wrote to memory of 2472 2832 svchost.exe 34 PID 2832 wrote to memory of 2472 2832 svchost.exe 34 PID 2832 wrote to memory of 2472 2832 svchost.exe 34 PID 2832 wrote to memory of 2472 2832 svchost.exe 34 PID 2832 wrote to memory of 2472 2832 svchost.exe 34 PID 2832 wrote to memory of 2472 2832 svchost.exe 34 PID 2832 wrote to memory of 2472 2832 svchost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\LZMA.exe"C:\Users\Admin\AppData\Local\Temp\LZMA.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
C:\ProgramData\Microsoft\CryptSvcser\LZMA.exe"C:\ProgramData\Microsoft\CryptSvcser\LZMA.exe" 100 29321⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
C:\ProgramData\Microsoft\CryptSvcser\LZMA.exe"C:\ProgramData\Microsoft\CryptSvcser\LZMA.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 209 28323⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD589266366e2c712e8b47b2b9ed30d60b7
SHA1a94bb0440fe6c0d7a6c102037561ffbe6203a251
SHA256f7369777a4fee1b2e8282f30dc355c3216e4fdc7018912f2a7444026f9edafd0
SHA512385916c9bbc9a4d7474bfcc68c4fb281e2f3d6df5c11a114b8646400f8a822a5c945f80de2d8d97547e58971b03bcada2f28fc2f259db07ea1880b3fa68b3d95
-
Filesize
400KB
MD5dd55071ced298687339566cbe9b23c40
SHA11b5f760daab97658f7c0f7c28db35f10bde761bb
SHA256ed10a005bbab4385775e5964586bad0c1d267edbf87ce98feb3cc7135877cca1
SHA512ae9753860775be0039463c408e080a2541465562702c2407b46d3ab15dacdae6721325eb60ae72e0b389da2524e6122593a6f9bf42f1c2df5c2cb8463c4026c8
-
Filesize
228KB
MD5fc5100b1fc7e642bf76fdc3df1846df5
SHA1664d22bc60a7cd08b8ba5aee9f045fa21de719cb
SHA2568a7e960d9aefce2bc6c515e63a46ea5d6e7db964301eb8a26c3dd561707eac77
SHA51246cc8e84c7e5668e4fa5da0eabab725da2c5c93bfcce6d7774e668b3e011c6f24d9e0513aac097366504e1139525879b9a43b128c37c719c0a25401ceb9fbe47