Analysis
-
max time kernel
145s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-02-2024 06:54
Static task
static1
Behavioral task
behavioral1
Sample
Backdoor.Win32.Plite.exe
Resource
win7-20240221-en
General
-
Target
Backdoor.Win32.Plite.exe
-
Size
61KB
-
MD5
ac18dbe74249bdd64ff7ddb125320064
-
SHA1
4f5d6ef53aa3a2e8231f117225aea666b0320783
-
SHA256
62f71e49ed5f1a322324c58e9aa1e97e206ddba975aa55e08c6d26f1fa787b0f
-
SHA512
93328d2a668fbe14e1ddcf00cfaef5dda61a88e0fabfac5e66c1129fe2e56f1b06dc4eaa0de904ef4a6fdd2d7007b3a07844ad70b1e035347c3fc21112c5257a
-
SSDEEP
1536:1jeTAG/cbPGIZ+yy9YKU/p5mhnD4Nje4ur13t:1jYAaM7ZSY9esEVf
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.207
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation Backdoor.Win32.Plite.exe -
Executes dropped EXE 1 IoCs
pid Process 4052 huter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4480 wrote to memory of 4052 4480 Backdoor.Win32.Plite.exe 90 PID 4480 wrote to memory of 4052 4480 Backdoor.Win32.Plite.exe 90 PID 4480 wrote to memory of 4052 4480 Backdoor.Win32.Plite.exe 90 PID 4480 wrote to memory of 3856 4480 Backdoor.Win32.Plite.exe 92 PID 4480 wrote to memory of 3856 4480 Backdoor.Win32.Plite.exe 92 PID 4480 wrote to memory of 3856 4480 Backdoor.Win32.Plite.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Plite.exe"C:\Users\Admin\AppData\Local\Temp\Backdoor.Win32.Plite.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:4052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵PID:3856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5f45c82adf9ef8413d78bd3230b411302
SHA1334971369d92e5aeb3d541b0d9fb1dfa1c8c8d44
SHA2563ba2f989c72cfb256155b9f51fc6c3de41f5e1b8bb58b89076f9d8f927c95ca0
SHA512602a7e0e01b8367b81ab70167c92d09db8df4466f8483580ca6b48926332ccbfb1379f7f308c534f3d1ff127fb2b4ec69f3927a7313c7952f230dfa57cbbc093
-
Filesize
61KB
MD5a28d8832cd005aa040e8262a6144254a
SHA157fdab39769a70b9db0aa6144bb4d040fa0301fc
SHA256bc818e30318496557e13da02804f9d9806ff5aa4b4b144ea268911c84be0829e
SHA512e0d760cc47d13bc50d0f65eb4dca139dbc682469a19cee18909128bb137bcb25f80444a6e45c588991495d43863ebbc9563dd7778ee6ca29f180c1456d1e17c1
-
Filesize
250B
MD5b6ac74a17ea9df40fa00e66362d0128c
SHA1ebfabc9e75e4493a0c88b1b7b1e6d195eaebe592
SHA2564445fd331d80b02affa2a95ecad6e275aa5c7c1e08ea8494a979f93d4fba0b78
SHA512b997c51b7ce523625b6b454f96a88c4df08d5b5526a33ec8a0244d6a8be7d68dd01a6c72ae618a758a49dbd131ca2c5337fae576bee617450acafeab3844c4e1