Analysis
-
max time kernel
168s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
update/USOPrivate.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
update/USOPrivate.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
update/log.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
update/log.dll
Resource
win10v2004-20240226-en
General
-
Target
update/USOPrivate.exe
-
Size
760KB
-
MD5
10866465a9b0c56af2cd093b80cdbc9f
-
SHA1
fc77be3e68a79b597ffed1b307d1b447787e7995
-
SHA256
9831526e475a4ed0d149bec15f69193a48249c3cda1ddb2f2140292afd862cfa
-
SHA512
975c0c3abe71d29a1391bc9a258df9560466f40764ff6dd8b06db5234d45a6c12f27c77bd26409fda051de598cdc0087afd847e46818553c5ed3eff53cfe2091
-
SSDEEP
6144:c3PgKtEhPIPe16jzM66rBghPlNoVh5j9mmNpMHGIygduNrnoh/WOHI0jVjSjztx/:eIA4PIPoQMFgDNg/jMmLohW70Rj+ztp
Malware Config
Signatures
-
Detects PlugX payload 24 IoCs
Processes:
resource yara_rule behavioral1/memory/2688-2-0x0000000001DA0000-0x0000000001DDC000-memory.dmp family_plugx behavioral1/memory/2560-23-0x0000000001E70000-0x0000000001EAC000-memory.dmp family_plugx behavioral1/memory/2560-24-0x0000000001E70000-0x0000000001EAC000-memory.dmp family_plugx behavioral1/memory/2504-29-0x0000000001BD0000-0x0000000001C0C000-memory.dmp family_plugx behavioral1/memory/2444-35-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2444-37-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2444-36-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2504-38-0x0000000001BD0000-0x0000000001C0C000-memory.dmp family_plugx behavioral1/memory/2688-44-0x0000000001DA0000-0x0000000001DDC000-memory.dmp family_plugx behavioral1/memory/2444-50-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2444-51-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2444-52-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2444-53-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2444-55-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2444-54-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2444-56-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2444-58-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2560-59-0x0000000001E70000-0x0000000001EAC000-memory.dmp family_plugx behavioral1/memory/2828-70-0x0000000000290000-0x00000000002CC000-memory.dmp family_plugx behavioral1/memory/2828-73-0x0000000000290000-0x00000000002CC000-memory.dmp family_plugx behavioral1/memory/2828-74-0x0000000000290000-0x00000000002CC000-memory.dmp family_plugx behavioral1/memory/2828-75-0x0000000000290000-0x00000000002CC000-memory.dmp family_plugx behavioral1/memory/2444-76-0x0000000000480000-0x00000000004BC000-memory.dmp family_plugx behavioral1/memory/2828-77-0x0000000000290000-0x00000000002CC000-memory.dmp family_plugx -
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 103.56.18.101 Destination IP 103.56.18.101 Destination IP 103.56.18.101 Destination IP 103.56.18.101 Destination IP 123.111.231.1 -
Deletes itself 1 IoCs
Processes:
USOPrivate.exepid process 2560 USOPrivate.exe -
Executes dropped EXE 2 IoCs
Processes:
USOPrivate.exeUSOPrivate.exepid process 2560 USOPrivate.exe 2504 USOPrivate.exe -
Loads dropped DLL 3 IoCs
Processes:
USOPrivate.exeUSOPrivate.exepid process 2604 2560 USOPrivate.exe 2504 USOPrivate.exe -
Modifies registry class 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 35003100450036004300460031003900430035003000340041004400420046000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
USOPrivate.exeUSOPrivate.exeUSOPrivate.exesvchost.exemsiexec.exepid process 2688 USOPrivate.exe 2688 USOPrivate.exe 2560 USOPrivate.exe 2560 USOPrivate.exe 2504 USOPrivate.exe 2504 USOPrivate.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2444 svchost.exe 2444 svchost.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2444 svchost.exe 2444 svchost.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2444 svchost.exe 2444 svchost.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2444 svchost.exe 2444 svchost.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe 2828 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
svchost.exemsiexec.exepid process 2444 svchost.exe 2828 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
USOPrivate.exeUSOPrivate.exeUSOPrivate.exesvchost.exemsiexec.exedescription pid process Token: SeDebugPrivilege 2688 USOPrivate.exe Token: SeTcbPrivilege 2688 USOPrivate.exe Token: SeDebugPrivilege 2560 USOPrivate.exe Token: SeTcbPrivilege 2560 USOPrivate.exe Token: SeDebugPrivilege 2504 USOPrivate.exe Token: SeTcbPrivilege 2504 USOPrivate.exe Token: SeDebugPrivilege 2444 svchost.exe Token: SeTcbPrivilege 2444 svchost.exe Token: SeDebugPrivilege 2828 msiexec.exe Token: SeTcbPrivilege 2828 msiexec.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
USOPrivate.exesvchost.exedescription pid process target process PID 2504 wrote to memory of 2444 2504 USOPrivate.exe svchost.exe PID 2504 wrote to memory of 2444 2504 USOPrivate.exe svchost.exe PID 2504 wrote to memory of 2444 2504 USOPrivate.exe svchost.exe PID 2504 wrote to memory of 2444 2504 USOPrivate.exe svchost.exe PID 2504 wrote to memory of 2444 2504 USOPrivate.exe svchost.exe PID 2504 wrote to memory of 2444 2504 USOPrivate.exe svchost.exe PID 2504 wrote to memory of 2444 2504 USOPrivate.exe svchost.exe PID 2504 wrote to memory of 2444 2504 USOPrivate.exe svchost.exe PID 2444 wrote to memory of 2828 2444 svchost.exe msiexec.exe PID 2444 wrote to memory of 2828 2444 svchost.exe msiexec.exe PID 2444 wrote to memory of 2828 2444 svchost.exe msiexec.exe PID 2444 wrote to memory of 2828 2444 svchost.exe msiexec.exe PID 2444 wrote to memory of 2828 2444 svchost.exe msiexec.exe PID 2444 wrote to memory of 2828 2444 svchost.exe msiexec.exe PID 2444 wrote to memory of 2828 2444 svchost.exe msiexec.exe PID 2444 wrote to memory of 2828 2444 svchost.exe msiexec.exe PID 2444 wrote to memory of 2828 2444 svchost.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\update\USOPrivate.exe"C:\Users\Admin\AppData\Local\Temp\update\USOPrivate.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
C:\ProgramData\Bitdefender\update\USOPrivate.exe"C:\ProgramData\Bitdefender\update\USOPrivate.exe" 100 26881⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
C:\ProgramData\Bitdefender\update\USOPrivate.exe"C:\ProgramData\Bitdefender\update\USOPrivate.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe 209 24443⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD51eb44d7ec4d7d2a13a81d7542ef6bc2b
SHA1f35d30962790b99cc29d38ccf6e9e66c82e5aa80
SHA256bdba1d2043bd89693895c079d57d2494a02d435eae2981bc20bd3b92e9c8dece
SHA5129a570ced024157613d01ed30293b21b81155401790a160dd42446ad15119c6b2da4362435f39ffba404b266a7831bfb955edbf42412987769c2405655471e97c
-
Filesize
54KB
MD52a747a6201189e133c18ae24e44476f3
SHA1002be31d69cf30bc8a8e2ed51c038a5bdfd88141
SHA2560cc36dd25e099cc6f1798dabe1d6a3e2d8c3883aa0e0d7296e94d035cdb74f3c
SHA51236080f7595b6a1c05ecce348a75adbac4cdf8ccc441a724e3aa50130c62cd74d3948dabf8343b95cd90043f569b7f301f94102626942e9c0080133c486a830b3
-
Filesize
760KB
MD510866465a9b0c56af2cd093b80cdbc9f
SHA1fc77be3e68a79b597ffed1b307d1b447787e7995
SHA2569831526e475a4ed0d149bec15f69193a48249c3cda1ddb2f2140292afd862cfa
SHA512975c0c3abe71d29a1391bc9a258df9560466f40764ff6dd8b06db5234d45a6c12f27c77bd26409fda051de598cdc0087afd847e46818553c5ed3eff53cfe2091