Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 11:50
Behavioral task
behavioral1
Sample
Plague crack/Client.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Plague crack/Client.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Plague crack/Launcher.bat
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Plague crack/Launcher.bat
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Plague crack/Loader.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Plague crack/Loader.exe
Resource
win10v2004-20240709-en
General
-
Target
Plague crack/Loader.exe
-
Size
2.5MB
-
MD5
63847b942967176de1c5f82f3955b75d
-
SHA1
01444058174d309899c4cf3795e8d5ba36a5df6c
-
SHA256
32935173c6abc5b6560dfa6eae736164f1ecf94849580b4ba36d9d1156815872
-
SHA512
438bad890dd9744fcebc2452d78ef56754bf2deac01d2462e34d3f33ff7e2f83ee9c2aadec7654f3764f647ee2bbf50c2e6f3aff67277e9b4813ca841f557a43
-
SSDEEP
49152:jzf6V1jqp9ekTDKSxfHLqY+xKkmyLW5RhM0glm:jzyV0pXfOtIFIlm
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Loader.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe Loader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Plague crack\\Loader.exe" Loader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Loader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Plague crack\\Loader.exe" Loader.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Plague crack\\Loader.exe" Loader.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe 2384 Loader.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2384 Loader.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 2384 Loader.exe Token: SeRestorePrivilege 2384 Loader.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2384 Loader.exe 2372 Loader.exe -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Loader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Loader.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\HideFastUserSwitching = "1" Loader.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Plague crack\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Plague crack\Loader.exe"1⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Plague crack\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Plague crack\Loader.exe" explorer.exe1⤵
- Suspicious use of SetWindowsHookEx
PID:2372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1