Analysis

  • max time kernel
    157s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 01:36

General

  • Target

    $TEMP/arpa.exe

  • Size

    95KB

  • MD5

    28c6f235946fd694d2634c7a2f24c1ba

  • SHA1

    e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5

  • SHA256

    c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763

  • SHA512

    16865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be

  • SSDEEP

    1536:d4mHlQgfJA3DrnN6TU3W9bEuLJDuUVfwX9Gy5JE840gbDcCRDb9:dBFwrs9bb1VYXH5JE840Ax/9

Malware Config

Signatures

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMP\arpa.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMP\arpa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe
      "C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe" -app
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1364
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4060 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:684

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\ESET Malware ProtectionLYo\http_dll.dat

      Filesize

      81KB

      MD5

      27a4ed145a9a6cb41af09b8927fd5bee

      SHA1

      815be32e1ae7ec20621e87239a6279fbba2fc8b5

      SHA256

      3fbbf30015b64b50912c09c43052ac48b1983e869cebfb88dd1271fcb4e60d10

      SHA512

      2978496330e0dcfafad6b9186181febe4af28cb7bec227bfab3f0be711e5160b96692a9752e260bf585abc0a5d481bd4d408ead88e0e2973552e4abb934107a8

    • C:\ProgramData\ESET Malware ProtectionLYo\http_dll.dll

      Filesize

      20KB

      MD5

      5b92266d9a26260b4c9920ede267ba37

      SHA1

      372d5455fdb689787e7e49f7799510c6c2cdf6b7

      SHA256

      d3c41834ea1a05eb19b6012a9c0c4a2dd9df243af0df56885edabedfe3fea261

      SHA512

      db9b277d74d1c50b8580b8dbeef1f5c3f54a6cf436a95c658bf7b8201d48ed651400fdde84d7297abf7f71b1f8f2bf335716833e564fa25cf10483b5f8766ec5

    • C:\ProgramData\ESET Malware ProtectionLYo\unsecapp.exe

      Filesize

      95KB

      MD5

      28c6f235946fd694d2634c7a2f24c1ba

      SHA1

      e9a9ce1ff07834d6ba9a51ba0d9e7c7a0b68d3e5

      SHA256

      c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763

      SHA512

      16865c473e010950a2aa25263af70074ad7539a86dc20e0a253df39e54e3635e99e821d4df83cd7a0eaeff10c75782966439d16d056427e824be8df953e138be

    • memory/1028-1-0x0000000002F90000-0x0000000002FB0000-memory.dmp

      Filesize

      128KB

    • memory/1028-2-0x00000000014F0000-0x00000000015F0000-memory.dmp

      Filesize

      1024KB

    • memory/1364-13-0x0000000000BC0000-0x0000000000BE0000-memory.dmp

      Filesize

      128KB

    • memory/1364-14-0x0000000000C50000-0x0000000000D50000-memory.dmp

      Filesize

      1024KB

    • memory/1364-15-0x0000000000C50000-0x0000000000D50000-memory.dmp

      Filesize

      1024KB