Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 10:09
Static task
static1
Behavioral task
behavioral1
Sample
2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe
Resource
win7-20240221-en
General
-
Target
2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe
-
Size
860KB
-
MD5
3a2913d25c9f743aa19fe0581face480
-
SHA1
f503677472863ffd1c60b71ceb5e3dcf74d16467
-
SHA256
2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e
-
SHA512
5cf1695161307b216cab4575a147dcf1244490090876b0e5c26178a4cc826546e5f8aed9b56bbe28c29f716bce0d314d613becae764ebe3ab95ce644058f2ae7
-
SSDEEP
12288:y0nyfXuIBDtfuM2gsTv1Wt8r5NcDPsNprQy4a8Wyb8ywnVvRdkbHw3sHgd7:fny/f9uM2gev1E8UwNpEVaT0YoVHk7
Malware Config
Signatures
-
Detects PlugX payload 24 IoCs
resource yara_rule behavioral1/memory/2608-30-0x00000000002A0000-0x00000000002CD000-memory.dmp family_plugx behavioral1/memory/2456-56-0x0000000000280000-0x00000000002AD000-memory.dmp family_plugx behavioral1/memory/2456-57-0x0000000000280000-0x00000000002AD000-memory.dmp family_plugx behavioral1/memory/560-62-0x0000000000340000-0x000000000036D000-memory.dmp family_plugx behavioral1/memory/560-63-0x0000000000340000-0x000000000036D000-memory.dmp family_plugx behavioral1/memory/1040-69-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/1040-72-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/2608-79-0x00000000002A0000-0x00000000002CD000-memory.dmp family_plugx behavioral1/memory/1040-86-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/1040-87-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/1040-88-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/1040-89-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/1040-90-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/1040-91-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/1040-92-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/1040-93-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/1040-96-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/2456-97-0x0000000000280000-0x00000000002AD000-memory.dmp family_plugx behavioral1/memory/2244-108-0x00000000003B0000-0x00000000003DD000-memory.dmp family_plugx behavioral1/memory/2244-111-0x00000000003B0000-0x00000000003DD000-memory.dmp family_plugx behavioral1/memory/2244-112-0x00000000003B0000-0x00000000003DD000-memory.dmp family_plugx behavioral1/memory/2244-113-0x00000000003B0000-0x00000000003DD000-memory.dmp family_plugx behavioral1/memory/1040-114-0x0000000000100000-0x000000000012D000-memory.dmp family_plugx behavioral1/memory/2244-115-0x00000000003B0000-0x00000000003DD000-memory.dmp family_plugx -
Executes dropped EXE 3 IoCs
pid Process 2608 Display3D.exe 2456 Display3D.exe 560 Display3D.exe -
Loads dropped DLL 4 IoCs
pid Process 2456 Display3D.exe 2456 Display3D.exe 560 Display3D.exe 560 Display3D.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 182.16.70.42 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 38003600320032003300440042003800360036004300440035003400410033000000 svchost.exe Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1040 svchost.exe 2244 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2608 Display3D.exe 2608 Display3D.exe 2456 Display3D.exe 1040 svchost.exe 1040 svchost.exe 1040 svchost.exe 1040 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 1040 svchost.exe 1040 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 1040 svchost.exe 1040 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 1040 svchost.exe 1040 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 1040 svchost.exe 1040 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe 2244 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1040 svchost.exe 2244 svchost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2608 Display3D.exe Token: SeTcbPrivilege 2608 Display3D.exe Token: SeDebugPrivilege 2456 Display3D.exe Token: SeTcbPrivilege 2456 Display3D.exe Token: SeDebugPrivilege 560 Display3D.exe Token: SeTcbPrivilege 560 Display3D.exe Token: SeDebugPrivilege 1040 svchost.exe Token: SeTcbPrivilege 1040 svchost.exe Token: SeDebugPrivilege 2244 svchost.exe Token: SeTcbPrivilege 2244 svchost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1072 2196 2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe 28 PID 2196 wrote to memory of 1072 2196 2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe 28 PID 2196 wrote to memory of 1072 2196 2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe 28 PID 2196 wrote to memory of 1072 2196 2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe 28 PID 2196 wrote to memory of 1072 2196 2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe 28 PID 2196 wrote to memory of 1072 2196 2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe 28 PID 2196 wrote to memory of 1072 2196 2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe 28 PID 1072 wrote to memory of 2608 1072 cmd.exe 30 PID 1072 wrote to memory of 2608 1072 cmd.exe 30 PID 1072 wrote to memory of 2608 1072 cmd.exe 30 PID 1072 wrote to memory of 2608 1072 cmd.exe 30 PID 1072 wrote to memory of 2608 1072 cmd.exe 30 PID 1072 wrote to memory of 2608 1072 cmd.exe 30 PID 1072 wrote to memory of 2608 1072 cmd.exe 30 PID 560 wrote to memory of 1040 560 Display3D.exe 34 PID 560 wrote to memory of 1040 560 Display3D.exe 34 PID 560 wrote to memory of 1040 560 Display3D.exe 34 PID 560 wrote to memory of 1040 560 Display3D.exe 34 PID 560 wrote to memory of 1040 560 Display3D.exe 34 PID 560 wrote to memory of 1040 560 Display3D.exe 34 PID 560 wrote to memory of 1040 560 Display3D.exe 34 PID 560 wrote to memory of 1040 560 Display3D.exe 34 PID 560 wrote to memory of 1040 560 Display3D.exe 34 PID 1040 wrote to memory of 2244 1040 svchost.exe 35 PID 1040 wrote to memory of 2244 1040 svchost.exe 35 PID 1040 wrote to memory of 2244 1040 svchost.exe 35 PID 1040 wrote to memory of 2244 1040 svchost.exe 35 PID 1040 wrote to memory of 2244 1040 svchost.exe 35 PID 1040 wrote to memory of 2244 1040 svchost.exe 35 PID 1040 wrote to memory of 2244 1040 svchost.exe 35 PID 1040 wrote to memory of 2244 1040 svchost.exe 35 PID 1040 wrote to memory of 2244 1040 svchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe"C:\Users\Admin\AppData\Local\Temp\2ecb9e6f123aef47a0650fbd76da8d57408bc43413959750f46b47645e58f88e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\run.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\Display3D.exeDisplay3D.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
-
C:\ProgramData\CryptSvcs\Display3D.exe"C:\ProgramData\CryptSvcs\Display3D.exe" 100 26081⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
C:\ProgramData\CryptSvcs\Display3D.exe"C:\ProgramData\CryptSvcs\Display3D.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 209 10403⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
427KB
MD504d96003c2fc885a648028b50c4b0ed0
SHA16dbcc75a74ef43a275ba90246279ece264dc7a4f
SHA256ab6f2d57c89435f667a4edc72635188aee2c559c6c0b6c6272cdf18ac44c1fe1
SHA512d99a8b7f97a0cdafeef07e6bc6469275f762331f4a5ecf701114ff30d2c3571befa29e47376197d164be3b2e63628bbb6e6e659c54e4e34b98a19a51900c8dbf
-
Filesize
30B
MD5da1c5ecc36b8b96cf9bfeed44581ca69
SHA13de0e37509fb5211971cbbfcabf76f6afddd17fd
SHA256ca22a76ef4cc3b48793b0cf6bd68d000d74711079596989a2a209f1ecb012a04
SHA5124b49ce6fdbcd036d680c8646f78573e088704a9fa8c8e109cd7ae0a1fbddf8e9fa719779454495004c28dccfd0b3133005b45ce70903eef95b639f0ea2b84217
-
Filesize
673KB
MD54d27c761c43f1f4094005889efd968eb
SHA13900a153f894dda7a8b23984b20d87b3ae6b01ab
SHA2567afd418750824969fd6d0c6db949456998f792c97d6a69669051e1c90a458a5b
SHA5125a173e16fec3555da024555c3b8ca3c95667b6f6e2286c8ab83a63a70b614effe01c7332a9f518ceb9cc6754295bbfc3fffb93e7e6ca36050a4e3a38ac48dc2e
-
Filesize
74KB
MD5eb21f4f06f900c89519ccf17a0ead35b
SHA1ad30037f31f910ece2ba79fa30e55128d63059e6
SHA256618e38e0e5ccdefbd4bc4987f60c40f1c2f733c2441ed2026d1530910d7196bd
SHA512dd58edad7fdd0e8f352805f75bff7bfda1b016f0815b8df68b9947e456b47f140fc470dbf9ec37adc724601c27ca7276ba88bdc62573b44167bcd12c19cc482a
-
Filesize
113KB
MD57bdb5c71559aa4eac77ec64b5ac87f3f
SHA10a2c272f8e20025da6aad163fa8a21ff5e5405c3
SHA256817b7a5aebfd53e2792d1d2a5b3ae7948b6557473064f04639479449cbb9157a
SHA512e27069b7491c618e70215dc02bae766e6c761cd2a924cd49538e3b8156acaa53c434e9c36989ef5361cd404f9550fc3761fc0238bd616d71fcb5e5d5e533ecf7