Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18-03-2024 11:37

General

  • Target

    d369b0abb477bed3cda7ee99b203d45d.exe

  • Size

    344KB

  • MD5

    d369b0abb477bed3cda7ee99b203d45d

  • SHA1

    e77c9f4eead9652134c3eb82741bfecdd6a191e0

  • SHA256

    769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c

  • SHA512

    257cebd19cc4509bdd9e7a62a0623bd2fffac3554f113707aba187370490b3a741438b0eec18a42fb214467862e48491bc69ba6f1b56549eb5445f73c3252cd5

  • SSDEEP

    6144:VcPsBlXxcupxfbs9Sx7NqRz9In+Ml1vob6dtv4Dr5pT:Vflmupxfa0SodlhoW7v4v5pT

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d369b0abb477bed3cda7ee99b203d45d.exe
    "C:\Users\Admin\AppData\Local\Temp\d369b0abb477bed3cda7ee99b203d45d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2232
    • \??\c:\windows\temp\avg.exe
      c:\windows\temp\avg.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\arpa.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Users\Admin\AppData\Local\Temp\arpa.exe
          "C:\Users\Admin\AppData\Local\Temp\arpa.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1704
          • C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe
            "C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\arpa.exe

    Filesize

    95KB

    MD5

    28c6f235946fd694d2634c7a2f24c1ba

    SHA1

    e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5

    SHA256

    c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763

    SHA512

    16865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be

  • C:\Users\Admin\AppData\Local\Temp\http_dll.dat

    Filesize

    81KB

    MD5

    27a4ed145a9a6cb41af09b8927fd5bee

    SHA1

    815be32e1ae7ec20621e87239a6279fbba2fc8b5

    SHA256

    3fbbf30015b64b50912c09c43052ac48b1983e869cebfb88dd1271fcb4e60d10

    SHA512

    2978496330e0dcfafad6b9186181febe4af28cb7bec227bfab3f0be711e5160b96692a9752e260bf585abc0a5d481bd4d408ead88e0e2973552e4abb934107a8

  • C:\Users\Admin\AppData\Local\Temp\http_dll.dll

    Filesize

    20KB

    MD5

    5b92266d9a26260b4c9920ede267ba37

    SHA1

    372d5455fdb689787e7e49f7799510c6c2cdf6b7

    SHA256

    d3c41834ea1a05eb19b6012a9c0c4a2dd9df243af0df56885edabedfe3fea261

    SHA512

    db9b277d74d1c50b8580b8dbeef1f5c3f54a6cf436a95c658bf7b8201d48ed651400fdde84d7297abf7f71b1f8f2bf335716833e564fa25cf10483b5f8766ec5

  • \Windows\Temp\avg.exe

    Filesize

    125KB

    MD5

    fba356748c02da7a65ddef9470aa1cf2

    SHA1

    e0e3b538d015b1eb06a8a663bc746a36c3cc5848

    SHA256

    792eba5ba91a52bfb3b369107f38fb9a7e7b7987cd870f465338eae59e81f3f6

    SHA512

    f626824b33ea03f690500058c73ba662a1363535f80e7b05149dc8b580bd6bf514b334f3509283933993d0947b254c30cb6ddbf7be99d53de471997a2ef2f71d

  • memory/1704-19-0x0000000000360000-0x0000000000460000-memory.dmp

    Filesize

    1024KB

  • memory/1704-18-0x0000000000130000-0x0000000000150000-memory.dmp

    Filesize

    128KB

  • memory/2556-34-0x0000000000110000-0x0000000000130000-memory.dmp

    Filesize

    128KB

  • memory/2556-35-0x00000000006F0000-0x00000000007F0000-memory.dmp

    Filesize

    1024KB

  • memory/2556-36-0x00000000006F0000-0x00000000007F0000-memory.dmp

    Filesize

    1024KB