Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2024 16:09

General

  • Target

    LZMA.exe

  • Size

    388KB

  • MD5

    89266366e2c712e8b47b2b9ed30d60b7

  • SHA1

    a94bb0440fe6c0d7a6c102037561ffbe6203a251

  • SHA256

    f7369777a4fee1b2e8282f30dc355c3216e4fdc7018912f2a7444026f9edafd0

  • SHA512

    385916c9bbc9a4d7474bfcc68c4fb281e2f3d6df5c11a114b8646400f8a822a5c945f80de2d8d97547e58971b03bcada2f28fc2f259db07ea1880b3fa68b3d95

  • SSDEEP

    12288:1PzUcyOjaTbV7DWZzZg1iuc30Oy7CxMFr:Vz1y6AbV+qwEr

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 25 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LZMA.exe
    "C:\Users\Admin\AppData\Local\Temp\LZMA.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2932
  • C:\ProgramData\Microsoft\CryptSvcser\LZMA.exe
    "C:\ProgramData\Microsoft\CryptSvcser\LZMA.exe" 100 2932
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1760
  • C:\ProgramData\Microsoft\CryptSvcser\LZMA.exe
    "C:\ProgramData\Microsoft\CryptSvcser\LZMA.exe" 200 0
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 201 0
      2⤵
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe 209 2832
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2472

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\CryptSvcser\LZMA.exe

    Filesize

    388KB

    MD5

    89266366e2c712e8b47b2b9ed30d60b7

    SHA1

    a94bb0440fe6c0d7a6c102037561ffbe6203a251

    SHA256

    f7369777a4fee1b2e8282f30dc355c3216e4fdc7018912f2a7444026f9edafd0

    SHA512

    385916c9bbc9a4d7474bfcc68c4fb281e2f3d6df5c11a114b8646400f8a822a5c945f80de2d8d97547e58971b03bcada2f28fc2f259db07ea1880b3fa68b3d95

  • C:\ProgramData\Microsoft\CryptSvcser\expatai.dll

    Filesize

    400KB

    MD5

    dd55071ced298687339566cbe9b23c40

    SHA1

    1b5f760daab97658f7c0f7c28db35f10bde761bb

    SHA256

    ed10a005bbab4385775e5964586bad0c1d267edbf87ce98feb3cc7135877cca1

    SHA512

    ae9753860775be0039463c408e080a2541465562702c2407b46d3ab15dacdae6721325eb60ae72e0b389da2524e6122593a6f9bf42f1c2df5c2cb8463c4026c8

  • C:\ProgramData\Microsoft\CryptSvcser\update.log

    Filesize

    228KB

    MD5

    fc5100b1fc7e642bf76fdc3df1846df5

    SHA1

    664d22bc60a7cd08b8ba5aee9f045fa21de719cb

    SHA256

    8a7e960d9aefce2bc6c515e63a46ea5d6e7db964301eb8a26c3dd561707eac77

    SHA512

    46cc8e84c7e5668e4fa5da0eabab725da2c5c93bfcce6d7774e668b3e011c6f24d9e0513aac097366504e1139525879b9a43b128c37c719c0a25401ceb9fbe47

  • memory/1760-20-0x00000000008A0000-0x00000000008CD000-memory.dmp

    Filesize

    180KB

  • memory/1760-62-0x00000000008A0000-0x00000000008CD000-memory.dmp

    Filesize

    180KB

  • memory/1760-21-0x00000000008A0000-0x00000000008CD000-memory.dmp

    Filesize

    180KB

  • memory/2472-77-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2472-78-0x00000000001A0000-0x00000000001CD000-memory.dmp

    Filesize

    180KB

  • memory/2472-75-0x00000000001A0000-0x00000000001CD000-memory.dmp

    Filesize

    180KB

  • memory/2472-74-0x00000000001A0000-0x00000000001CD000-memory.dmp

    Filesize

    180KB

  • memory/2472-73-0x00000000001A0000-0x00000000001CD000-memory.dmp

    Filesize

    180KB

  • memory/2472-71-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2472-72-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2472-70-0x00000000001A0000-0x00000000001CD000-memory.dmp

    Filesize

    180KB

  • memory/2472-69-0x00000000001A0000-0x00000000001CD000-memory.dmp

    Filesize

    180KB

  • memory/2832-50-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2832-36-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2832-76-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2832-31-0x00000000000E0000-0x00000000000FB000-memory.dmp

    Filesize

    108KB

  • memory/2832-51-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2832-52-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2832-53-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2832-54-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2832-57-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2832-58-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2832-33-0x0000000000100000-0x0000000000102000-memory.dmp

    Filesize

    8KB

  • memory/2832-39-0x00000000001F0000-0x000000000021D000-memory.dmp

    Filesize

    180KB

  • memory/2832-35-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB

  • memory/2832-27-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB

  • memory/2884-38-0x0000000000160000-0x000000000018D000-memory.dmp

    Filesize

    180KB

  • memory/2884-26-0x0000000000160000-0x000000000018D000-memory.dmp

    Filesize

    180KB

  • memory/2884-25-0x0000000000160000-0x000000000018D000-memory.dmp

    Filesize

    180KB

  • memory/2932-0-0x0000000000950000-0x0000000000A50000-memory.dmp

    Filesize

    1024KB

  • memory/2932-43-0x00000000008D0000-0x00000000008FD000-memory.dmp

    Filesize

    180KB

  • memory/2932-2-0x00000000008D0000-0x00000000008FD000-memory.dmp

    Filesize

    180KB

  • memory/2932-1-0x00000000008D0000-0x00000000008FD000-memory.dmp

    Filesize

    180KB