Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 11:16

General

  • Target

    5ead238621bef7cc4c4f58ac5eb614dd16acbcfd30c75169ff5f16d7905243a5.exe

  • Size

    491KB

  • MD5

    e7f3d45d4e51176150f58d4b885e01e4

  • SHA1

    f8141b3f21e3f9f354eb960b841050cc2aabe03d

  • SHA256

    5ead238621bef7cc4c4f58ac5eb614dd16acbcfd30c75169ff5f16d7905243a5

  • SHA512

    63e87fc692ded07fc5f304813cc046ec8ac45958ca2254f1064e4cae0e03d4db4d4c6b5373f69b8b5075286d2206e10b30b05dad61cc15e64e18795d1d707174

  • SSDEEP

    12288:ZGqN/XdctpVtkYoAcoDDpY1sbF7A0Lxjulj/:PNcBtkjAcoMs5kUylj/

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 22 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 12 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ead238621bef7cc4c4f58ac5eb614dd16acbcfd30c75169ff5f16d7905243a5.exe
    "C:\Users\Admin\AppData\Local\Temp\5ead238621bef7cc4c4f58ac5eb614dd16acbcfd30c75169ff5f16d7905243a5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Layer.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Layer.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2348
  • C:\ProgramData\PlayWav\Layer.exe
    "C:\ProgramData\PlayWav\Layer.exe" 100 2348
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4896
  • C:\ProgramData\PlayWav\Layer.exe
    "C:\ProgramData\PlayWav\Layer.exe" 200 0
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe 201 0
      2⤵
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Windows\SysWOW64\msiexec.exe
        C:\Windows\system32\msiexec.exe 209 988
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:4388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Layer.exe

    Filesize

    99KB

    MD5

    431aa2dcbd1ff6815adc76537d63fb36

    SHA1

    fd294d12e590889dd26bc278a8540f46dbfbf879

    SHA256

    5cff0f4f3e01640a607f30861e42dff908fb8ceb5d8b833a560d1109c9b9a4e6

    SHA512

    0c0246f6468ac7e13a2e846e4d409d204069035b7f8b5aac0d0104a49ed1b36b7f5bad1d8e83fe09f37fb0a1dfe038282b79f82d797a3c846f738bcad09b995c

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\RoboForm.DLL

    Filesize

    89KB

    MD5

    a573648a7f56fa012c3e83f0c94a9709

    SHA1

    6be21e85c3aab4ca47db9341f6cc96c98c7bc185

    SHA256

    fc8ee97fd67dbcd47780713f076c36bedf7c29be0ba6f1912635b0557fc3764f

    SHA512

    39ee077f36560b386d271e31cf096561096c8d4686b9024a5f489bcb37a4ac2f96eb118a18708f1487139c47367dcc45efa9ac3959cfaabcad2830afa7e612e6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\update.log

    Filesize

    133KB

    MD5

    f8d21123dfa0d37caece024c47d434bb

    SHA1

    7f48d0b6d215fcbf6f9dddc900c7258c93e3cdc3

    SHA256

    f264e45f50ac959cc1eef7100c45684243be5ae8b541aa08f3c06ad6089f5404

    SHA512

    9c3d1b9ac0b82015f3fe2201cb3a1bf093dc97c893ecd11420d9a42b3024a134e5e5987e12214e770b72beec228bf478e460ef8c7da8f1bfbad78dbe7011b07f

  • memory/988-65-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-72-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-71-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-69-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-68-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-62-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-64-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-46-0x0000000001080000-0x0000000001081000-memory.dmp

    Filesize

    4KB

  • memory/988-48-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-49-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-63-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-556-0x0000000001710000-0x0000000001747000-memory.dmp

    Filesize

    220KB

  • memory/988-61-0x0000000001080000-0x0000000001081000-memory.dmp

    Filesize

    4KB

  • memory/2348-53-0x0000000002F10000-0x0000000002F47000-memory.dmp

    Filesize

    220KB

  • memory/2348-19-0x0000000002F10000-0x0000000002F47000-memory.dmp

    Filesize

    220KB

  • memory/2348-18-0x0000000002DC0000-0x0000000002EC0000-memory.dmp

    Filesize

    1024KB

  • memory/2348-20-0x0000000002F10000-0x0000000002F47000-memory.dmp

    Filesize

    220KB

  • memory/2956-45-0x0000000001260000-0x0000000001297000-memory.dmp

    Filesize

    220KB

  • memory/2956-44-0x0000000001260000-0x0000000001297000-memory.dmp

    Filesize

    220KB

  • memory/2956-51-0x0000000001260000-0x0000000001297000-memory.dmp

    Filesize

    220KB

  • memory/4388-219-0x0000000001560000-0x0000000001597000-memory.dmp

    Filesize

    220KB

  • memory/4388-217-0x0000000001270000-0x0000000001271000-memory.dmp

    Filesize

    4KB

  • memory/4388-722-0x0000000001270000-0x0000000001271000-memory.dmp

    Filesize

    4KB

  • memory/4388-889-0x0000000001560000-0x0000000001597000-memory.dmp

    Filesize

    220KB

  • memory/4896-80-0x00000000010F0000-0x0000000001127000-memory.dmp

    Filesize

    220KB

  • memory/4896-39-0x00000000010F0000-0x0000000001127000-memory.dmp

    Filesize

    220KB

  • memory/4896-40-0x00000000010F0000-0x0000000001127000-memory.dmp

    Filesize

    220KB