Overview
overview
9Static
static
3processlas...64.exe
windows10-2004-x64
9$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3CPUEater.exe
windows10-2004-x64
1Insights.exe
windows10-2004-x64
1InstallHelper.exe
windows10-2004-x64
1LogViewer.exe
windows10-2004-x64
1ProcessGovernor.exe
windows10-2004-x64
1ProcessLasso.exe
windows10-2004-x64
1ProcessLas...er.exe
windows10-2004-x64
5QuickUpgrade.exe
windows10-2004-x64
6ThreadRacer.exe
windows10-2004-x64
1TweakScheduler.exe
windows10-2004-x64
1bitsumsess...nt.exe
windows10-2004-x64
1pl-update.cmd
windows10-2004-x64
1pl.cmd
windows10-2004-x64
7plActivate.exe
windows10-2004-x64
1pl_rsrc_bulgarian.dll
windows10-2004-x64
1pl_rsrc_chinese.dll
windows10-2004-x64
1pl_rsrc_ch...al.dll
windows10-2004-x64
1pl_rsrc_english.dll
windows10-2004-x64
1pl_rsrc_finnish.dll
windows10-2004-x64
1pl_rsrc_french.dll
windows10-2004-x64
1pl_rsrc_german.dll
windows10-2004-x64
1pl_rsrc_italian.dll
windows10-2004-x64
1pl_rsrc_japanese.dll
windows10-2004-x64
1pl_rsrc_korean.dll
windows10-2004-x64
1pl_rsrc_polish.dll
windows10-2004-x64
1pl_rsrc_ptbr.dll
windows10-2004-x64
1pl_rsrc_russian.dll
windows10-2004-x64
1pl_rsrc_slovenian.dll
windows10-2004-x64
1Analysis
-
max time kernel
1799s -
max time network
1142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
processlassosetup64.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
CPUEater.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
Insights.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
InstallHelper.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
LogViewer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
ProcessGovernor.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
ProcessLasso.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
ProcessLassoLauncher.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral12
Sample
QuickUpgrade.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
ThreadRacer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
TweakScheduler.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
bitsumsessionagent.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
pl-update.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
pl.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
plActivate.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
pl_rsrc_bulgarian.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
pl_rsrc_chinese.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
pl_rsrc_chinese_traditional.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
pl_rsrc_english.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
pl_rsrc_finnish.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
pl_rsrc_french.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
pl_rsrc_german.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
pl_rsrc_italian.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
pl_rsrc_japanese.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
pl_rsrc_korean.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
pl_rsrc_polish.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
pl_rsrc_ptbr.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
pl_rsrc_russian.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral32
Sample
pl_rsrc_slovenian.dll
Resource
win10v2004-20240709-en
General
-
Target
QuickUpgrade.exe
-
Size
470KB
-
MD5
7ee9df8c8bcae05df1ca4f163fe1d8ad
-
SHA1
8afb7a02451c7275d5c83c9adda12670980dae87
-
SHA256
929b5910c1a2e4e595d7f2b7c7838317ae58671ca1fa38e2cc4144e093fe4afe
-
SHA512
b149115c65a43fb709d06db2906164f90dda254d2a42f17b68b0bee14fdf3b1a56c03441b302fe7a62ba320d85bb023aaf16b2b590a9a40d611c5a9e64df99fa
-
SSDEEP
3072:/MlF9kZSPyI9m1+rxy9dTDs/ZR1ctUA/86KF7HEyCwMQOrUsLVtPk7HoZ7WK7TRc:/Mlsi9u+ty9xElcyWK+EKfLP7WGo
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation QuickUpgrade.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation pl4sfx.exe -
Executes dropped EXE 4 IoCs
pid Process 4436 pl4sfx.exe 2092 PostUpdate.exe 632 bitsumsessionagent.exe 3156 processlasso.exe -
Loads dropped DLL 6 IoCs
pid Process 3540 QuickUpgrade.exe 3540 QuickUpgrade.exe 2092 PostUpdate.exe 2092 PostUpdate.exe 3156 processlasso.exe 3156 processlasso.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 PostUpdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PostUpdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 processlasso.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString processlasso.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 632 bitsumsessionagent.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 3156 processlasso.exe Token: SeDebugPrivilege 3156 processlasso.exe Token: SeChangeNotifyPrivilege 3156 processlasso.exe Token: SeIncBasePriorityPrivilege 3156 processlasso.exe Token: SeIncreaseQuotaPrivilege 3156 processlasso.exe Token: SeCreateGlobalPrivilege 3156 processlasso.exe Token: SeProfSingleProcessPrivilege 3156 processlasso.exe Token: SeBackupPrivilege 3156 processlasso.exe Token: SeRestorePrivilege 3156 processlasso.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3540 wrote to memory of 4436 3540 QuickUpgrade.exe 84 PID 3540 wrote to memory of 4436 3540 QuickUpgrade.exe 84 PID 3540 wrote to memory of 4436 3540 QuickUpgrade.exe 84 PID 4436 wrote to memory of 2092 4436 pl4sfx.exe 86 PID 4436 wrote to memory of 2092 4436 pl4sfx.exe 86 PID 2092 wrote to memory of 3156 2092 PostUpdate.exe 89 PID 2092 wrote to memory of 3156 2092 PostUpdate.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\QuickUpgrade.exe"C:\Users\Admin\AppData\Local\Temp\QuickUpgrade.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\bitsum\processlasso\pl4sfx.exe"C:\Users\Admin\AppData\Local\Temp\bitsum\processlasso\pl4sfx.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\PostUpdate.exe"C:\Users\Admin\AppData\Local\Temp\PostUpdate.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\processlasso.exe/postupdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bitsumsessionagent.exeC:\Users\Admin\AppData\Local\Temp\bitsumsessionagent.exe ----------------------------------------------------------------1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
662KB
MD5bb2506cfd974bbb671075703af3ba34d
SHA17dff63921930877f384d46ec2e83e9fc65631908
SHA256304d78f9754a1921b95c2efc91d2e3b746ea7fe64a8e88f096900fcfef95ab97
SHA512b18ede7522ce010e21b2f367276d1fd9bc8c8ae647f4534aefd2461879eaaa4dcfcaabdd47401de7764add7e9a4784afacb16376bd518c885fc19b6e1869b580
-
Filesize
471KB
MD53ca525e181221bea925983a7df61f712
SHA18f4d165464c6b9c275700b44a9f4edc3f5462cbb
SHA25613a9fbdf75a5051499685f2b140788e46a53af6890af094dbfe61ca766316d2f
SHA512ec73d2c502a15da048cabc85f16a0b65f9a8e81a7a3dd8e5108ea594e5c06e1e08d314fc7b72f6276a513aa1a6da1ad0b6b75e808842295e9e811e1e85c5b7a8
-
Filesize
2.9MB
MD55e30f03479a5607d89c4f5f372deae0b
SHA199ae6721a7b9efdcc23160610f23f71304ff039e
SHA256e0e414a143c82f06038cfaa468bdd39a39c683e07dc310923e6495bbc8d6751f
SHA512731ace4798c98522aa131f7e0f23250a99b502210dc6876a87099975abfae410e4913896f701db70845f577baa70db40d7bf1e82dc7f2ce29659228d7f13d7db
-
Filesize
177KB
MD57f55918ca6706935ebf3000e277ec7f3
SHA1725b09394b76ccc066ac4fbc00357fbbb2a60f34
SHA2567592cdd84b1085851f3a6ef03bc386a381117cdb884c720be1bd8dcf62a296ea
SHA512fe218d72e4e17097143860b57f22de32ecac1b5cbcb93e856404bed7884ce2b389d39f3ed654a1d8bdc5f08847ebfd3fdf9ba0f1f1efd32e55fe6bf250f9afc9
-
Filesize
1.9MB
MD540d2b640a737039f0ae3bea77470cdfd
SHA1f22c0a3ed620659ec76b1dc499b9965e4b6b3a2b
SHA256be8a66f9560f0f3d2dcb12a3608deeae7a64e87340462c0f409c640580c514f8
SHA51217b8d4c47875b909e4a70373033dd28cde2f2805509845eaf0ac264c85ddeec657d17276b38f37211d4102de87a8b0c91c646d17826b18c2f4f3f9badc4d3b29
-
Filesize
1.9MB
MD5258063bdcafc8fd2a2a50d9065989ad6
SHA1ee1bebd8c909d8ebe3b5b6f155c68fc7e6696e31
SHA25601b75b825eef6092db03156d3e87342a875bfd355a6cf8d9a87365f4c5fda85f
SHA512b0732da44481e09f38e903fab2bf81447bf661d785631ab2b7421a89b80ef2db38203d85dbea5535c5bb09e8550a2ca737db6c86eac372515ebdf803a59cb5ca
-
Filesize
1.8MB
MD5895af2aaf9c99ea08f42d52b97e50ec1
SHA1e514cbaf6d9e243f107efc74cf2fe7646d87dcb3
SHA256a160cee89af34cfefa86ba433aa367eb36a593782bc2c014e9744d15436b3870
SHA512dafe2dc0b3b7d612cdd07a6a870b5f881a8fa5d371040b4bb06d6b5fc6e84eb979ba89828cd7f76ac17b6c414174d8fe349ee44fe5bcdad422ad901657952bb9