Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-04-2024 11:33
Behavioral task
behavioral1
Sample
sample3.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
sample3.pdf
Resource
win10v2004-20240226-en
General
-
Target
sample3.pdf
-
Size
603KB
-
MD5
2b203ff7805a789f64ec614dee2a7e7b
-
SHA1
dfa47a1bacea6afc7e334a31ad53045338d29ec5
-
SHA256
a6dbaab6da4004321c979abf0b0270f44f56f793ac47751ccbc2989e258aea24
-
SHA512
263b79355f8541dabfd26b5e85bdf7e3423bab5081eb3c99131f5dad42cdde6eeed0d00b520bf7400a5ae86883a0270759cfa846ce71832d717ea2ccd2491257
-
SSDEEP
12288:dGROjjzZ2fNv33w32iaMLavQVXsEAop5tNIBUwlDq7p:GOjjzyNw2qLO6XstECFpq7p
Malware Config
Signatures
-
Detects PlugX payload 20 IoCs
resource yara_rule behavioral1/memory/1204-29-0x00000000002F0000-0x000000000031C000-memory.dmp family_plugx behavioral1/memory/2548-40-0x0000000000420000-0x000000000044C000-memory.dmp family_plugx behavioral1/memory/2304-51-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/2304-56-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/2304-55-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/2548-54-0x0000000000420000-0x000000000044C000-memory.dmp family_plugx behavioral1/memory/1204-62-0x00000000002F0000-0x000000000031C000-memory.dmp family_plugx behavioral1/memory/2304-75-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/2304-76-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/2304-77-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/2304-78-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/2304-81-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/2304-93-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/1584-102-0x0000000000260000-0x000000000028C000-memory.dmp family_plugx behavioral1/memory/1584-104-0x0000000000260000-0x000000000028C000-memory.dmp family_plugx behavioral1/memory/1584-106-0x0000000000260000-0x000000000028C000-memory.dmp family_plugx behavioral1/memory/2304-108-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/2304-109-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx behavioral1/memory/1584-110-0x0000000000260000-0x000000000028C000-memory.dmp family_plugx behavioral1/memory/2304-116-0x0000000000170000-0x000000000019C000-memory.dmp family_plugx -
Executes dropped EXE 3 IoCs
pid Process 2672 ~temqp.tmp 1204 CamMute.exe 2548 CamMute.exe -
Loads dropped DLL 4 IoCs
pid Process 2488 cscript.exe 2672 ~temqp.tmp 1204 CamMute.exe 2548 CamMute.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{67600140-557A-46D8-8EA8-DB0B52029A34} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{67600140-557A-46D8-8EA8-DB0B52029A34}\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-32-9f-40-50-8c svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{67600140-557A-46D8-8EA8-DB0B52029A34}\WpadDecisionTime = 40f1f20ebb85da01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{67600140-557A-46D8-8EA8-DB0B52029A34}\WpadDecisionReason = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{67600140-557A-46D8-8EA8-DB0B52029A34}\WpadNetworkName = "Network 2" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-32-9f-40-50-8c\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{67600140-557A-46D8-8EA8-DB0B52029A34}\WpadDecisionTime = e08ff00ebb85da01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{67600140-557A-46D8-8EA8-DB0B52029A34}\b2-32-9f-40-50-8c svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-32-9f-40-50-8c\WpadDecisionTime = e08ff00ebb85da01 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-32-9f-40-50-8c\WpadDecision = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-32-9f-40-50-8c\WpadDetectedUrl svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\b2-32-9f-40-50-8c\WpadDecisionTime = 40f1f20ebb85da01 svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 38003800310034004200320041004500390044004500420041003000340046000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2304 svchost.exe 2304 svchost.exe 2304 svchost.exe 2304 svchost.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 2304 svchost.exe 2304 svchost.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 2304 svchost.exe 2304 svchost.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 2304 svchost.exe 2304 svchost.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 2304 svchost.exe 2304 svchost.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 1584 msiexec.exe 2304 svchost.exe 2304 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1808 AcroRd32.exe 2304 svchost.exe 1584 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1204 CamMute.exe Token: SeTcbPrivilege 1204 CamMute.exe Token: SeDebugPrivilege 2548 CamMute.exe Token: SeTcbPrivilege 2548 CamMute.exe Token: SeDebugPrivilege 2304 svchost.exe Token: SeTcbPrivilege 2304 svchost.exe Token: SeDebugPrivilege 1584 msiexec.exe Token: SeTcbPrivilege 1584 msiexec.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2992 AcroRd32.exe 2992 AcroRd32.exe 2992 AcroRd32.exe 1808 AcroRd32.exe 1808 AcroRd32.exe 1808 AcroRd32.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2488 2992 AcroRd32.exe 28 PID 2992 wrote to memory of 2488 2992 AcroRd32.exe 28 PID 2992 wrote to memory of 2488 2992 AcroRd32.exe 28 PID 2992 wrote to memory of 2488 2992 AcroRd32.exe 28 PID 2488 wrote to memory of 2672 2488 cscript.exe 30 PID 2488 wrote to memory of 2672 2488 cscript.exe 30 PID 2488 wrote to memory of 2672 2488 cscript.exe 30 PID 2488 wrote to memory of 2672 2488 cscript.exe 30 PID 2488 wrote to memory of 2568 2488 cscript.exe 31 PID 2488 wrote to memory of 2568 2488 cscript.exe 31 PID 2488 wrote to memory of 2568 2488 cscript.exe 31 PID 2488 wrote to memory of 2568 2488 cscript.exe 31 PID 2672 wrote to memory of 1204 2672 ~temqp.tmp 32 PID 2672 wrote to memory of 1204 2672 ~temqp.tmp 32 PID 2672 wrote to memory of 1204 2672 ~temqp.tmp 32 PID 2672 wrote to memory of 1204 2672 ~temqp.tmp 32 PID 2548 wrote to memory of 2304 2548 CamMute.exe 34 PID 2548 wrote to memory of 2304 2548 CamMute.exe 34 PID 2548 wrote to memory of 2304 2548 CamMute.exe 34 PID 2548 wrote to memory of 2304 2548 CamMute.exe 34 PID 2548 wrote to memory of 2304 2548 CamMute.exe 34 PID 2548 wrote to memory of 2304 2548 CamMute.exe 34 PID 2548 wrote to memory of 2304 2548 CamMute.exe 34 PID 2548 wrote to memory of 2304 2548 CamMute.exe 34 PID 2548 wrote to memory of 2304 2548 CamMute.exe 34 PID 2568 wrote to memory of 1808 2568 cmd.exe 35 PID 2568 wrote to memory of 1808 2568 cmd.exe 35 PID 2568 wrote to memory of 1808 2568 cmd.exe 35 PID 2568 wrote to memory of 1808 2568 cmd.exe 35 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36 PID 2304 wrote to memory of 1584 2304 svchost.exe 36
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sample3.pdf"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp\Winword.js2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\~temqp.tmp~temqp.tmp3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\CAM\CamMute.exe"C:\Users\Admin\AppData\Local\Temp\CAM\CamMute.exe" 100 26724⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c Adobe.pdf3⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Adobe.pdf"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CAM\CamMute.exe"C:\Users\Admin\AppData\Local\Temp\CAM\CamMute.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 23043⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358B
MD556ed89ee9a4627e7d3b5c7a650f7ca04
SHA1ff490b2f89f7bcc800daa8d29193dbd3e422eb98
SHA25675e7e334ed2eab91acaf769a92111c3aa0f21176368d7c5da9972e32311ea8e7
SHA5129f59c0d9a72724f8b258e726f5f69f78fa79909fc486cbc182bdf289c28c49e235c6151b94f264c8b44f350404bd44cbe0dc2d4080b681c3765397fbf3ff7ff5
-
Filesize
78KB
MD56123154c0ead8f7050e0865614f79671
SHA10f7db7be2a7d35db235773711ac7b30a8ac072a3
SHA2568cfa1d6a3f07cc71ef995d41084565b506247f23df99f5924f83aaa9517d1215
SHA5124d1e9e495cf904d965dd0f888f59985783e9474b0d63406696447cc3f034515e044051079a38d6085c0259ef4fa10d7489d0f368e912536dae6320a642609d8e
-
Filesize
56KB
MD54c8cdd74359dad73a2d499e5775b9bb9
SHA189fde2c26d2bdbc5592aa54c65fac51e3f6df631
SHA256457b71d3effea8ec517277d17cf35a0b775103e549c0a779c81ba4eb125503ba
SHA5123395cbc20b924d1ea5694180b67a4f410fbfa25e9d977334911a3c9ea93724c7cec763ea2c77444761b93d353888ee262021c7be0cb98918fd5e5044571552c8
-
Filesize
111KB
MD5dc996c4855add1f655c899e9806c8b3e
SHA1757c919328aae9f8dfe36293f2095da73a866e89
SHA256a018fba9f923edf661a915311b72b25cd414f658b64e7f4272ca9622be049259
SHA512fbea508af9ef82d519d7f94c7b40266c8f002afc31421c7e303b74e6853804061e7b571c501244cd0ace377245db9259fbf330738749ab67718a60a05c31b6d9
-
Filesize
446KB
MD519047595de7edc3550963ced15347ce1
SHA1012695dfb871d0b72d5875faf9ac8c1ebac68952
SHA256a6c2bbb4726b396adea3fabaf6ea9f86fa48bdce6cadeb9999679bd54b918c91
SHA51271e243d64689ae900257ba57421d3daf88732376d557804665f1dc4f1899fbdd68a8f7d39f24795ec98896181483c3c73ef8f93a4ed3a6e57e1c6f434a817a36
-
Filesize
40KB
MD56be2cf583a8d3187a04772aee4c05ab6
SHA1d8ddeaf4a9c23bc05829bbb7b1738513bb1ac310
SHA256b81c356b56b292b51b0e03ee2c69d96de2a3e0e6f6e7f6111119400a6c7ac14f
SHA512b571ebda31070b5c48fca922e209712379dff14d32989d6acf664320b6c8ea1031e18a16903ac56e6909c93403467de4679bcc3989691ebf7bd11ece0ff1acfb
-
Filesize
222KB
MD537bc5cdaf9b026e334edd6752e3cdb00
SHA1ee7eb5b20e25aeb4456a360e50185f245a6cc065
SHA256c9a42238d5b1815458031395ef99896cf96656c1016abbe91ca9b0449f1eea6b
SHA512efec59fefba7095d91bcab3ad3c4e44e24634385179189335085f006fd5a0ed79e05831e4350555c8be19f8bcd2bb36d5a36d82841df53e047d7b9039262ddbf