Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2024 11:37

General

  • Target

    d369b0abb477bed3cda7ee99b203d45d.exe

  • Size

    344KB

  • MD5

    d369b0abb477bed3cda7ee99b203d45d

  • SHA1

    e77c9f4eead9652134c3eb82741bfecdd6a191e0

  • SHA256

    769863ec7ba1e28a77c7cc0bda19bb79e6869cae63ecdfab97c669fc40348a0c

  • SHA512

    257cebd19cc4509bdd9e7a62a0623bd2fffac3554f113707aba187370490b3a741438b0eec18a42fb214467862e48491bc69ba6f1b56549eb5445f73c3252cd5

  • SSDEEP

    6144:VcPsBlXxcupxfbs9Sx7NqRz9In+Ml1vob6dtv4Dr5pT:Vflmupxfa0SodlhoW7v4v5pT

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d369b0abb477bed3cda7ee99b203d45d.exe
    "C:\Users\Admin\AppData\Local\Temp\d369b0abb477bed3cda7ee99b203d45d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1808
    • \??\c:\windows\temp\avg.exe
      c:\windows\temp\avg.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4584
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" url.dll, FileProtocolHandler C:\Users\Admin\AppData\Local\Temp\arpa.exe
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Users\Admin\AppData\Local\Temp\arpa.exe
          "C:\Users\Admin\AppData\Local\Temp\arpa.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3908
          • C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe
            "C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4568
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\arpa.exe

      Filesize

      95KB

      MD5

      28c6f235946fd694d2634c7a2f24c1ba

      SHA1

      e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5

      SHA256

      c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763

      SHA512

      16865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be

    • C:\Users\Admin\AppData\Local\Temp\http_dll.dat

      Filesize

      81KB

      MD5

      27a4ed145a9a6cb41af09b8927fd5bee

      SHA1

      815be32e1ae7ec20621e87239a6279fbba2fc8b5

      SHA256

      3fbbf30015b64b50912c09c43052ac48b1983e869cebfb88dd1271fcb4e60d10

      SHA512

      2978496330e0dcfafad6b9186181febe4af28cb7bec227bfab3f0be711e5160b96692a9752e260bf585abc0a5d481bd4d408ead88e0e2973552e4abb934107a8

    • C:\Users\Admin\AppData\Local\Temp\http_dll.dll

      Filesize

      20KB

      MD5

      5b92266d9a26260b4c9920ede267ba37

      SHA1

      372d5455fdb689787e7e49f7799510c6c2cdf6b7

      SHA256

      d3c41834ea1a05eb19b6012a9c0c4a2dd9df243af0df56885edabedfe3fea261

      SHA512

      db9b277d74d1c50b8580b8dbeef1f5c3f54a6cf436a95c658bf7b8201d48ed651400fdde84d7297abf7f71b1f8f2bf335716833e564fa25cf10483b5f8766ec5

    • C:\Windows\Temp\avg.exe

      Filesize

      125KB

      MD5

      fba356748c02da7a65ddef9470aa1cf2

      SHA1

      e0e3b538d015b1eb06a8a663bc746a36c3cc5848

      SHA256

      792eba5ba91a52bfb3b369107f38fb9a7e7b7987cd870f465338eae59e81f3f6

      SHA512

      f626824b33ea03f690500058c73ba662a1363535f80e7b05149dc8b580bd6bf514b334f3509283933993d0947b254c30cb6ddbf7be99d53de471997a2ef2f71d

    • memory/3908-15-0x0000000001590000-0x0000000001690000-memory.dmp

      Filesize

      1024KB

    • memory/3908-14-0x0000000001520000-0x0000000001540000-memory.dmp

      Filesize

      128KB

    • memory/4568-26-0x0000000000E20000-0x0000000000E40000-memory.dmp

      Filesize

      128KB

    • memory/4568-27-0x0000000000E90000-0x0000000000F90000-memory.dmp

      Filesize

      1024KB

    • memory/4568-28-0x0000000000E90000-0x0000000000F90000-memory.dmp

      Filesize

      1024KB