Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 08:22

General

  • Target

    66f0d151d9994cc5811c746d48265e60N.exe

  • Size

    3.2MB

  • MD5

    66f0d151d9994cc5811c746d48265e60

  • SHA1

    455ad3c941653dbfd4b0727527d67344dcf96865

  • SHA256

    8b097b6ebfe177d49434f4d632ce912792d52c149f431dd51c8e8631110abefa

  • SHA512

    f54b4a99782fda97530d79fb48776d8b3641d530c31c0fd2ac327ba6fbaf899bb3d39cc3b57a1973b63596ea59b1ddec8999f03705b0fd2ccac3f5b627f23bfe

  • SSDEEP

    49152:t5NbfJJb4/WGdvbKJJb4/WGBJJb4/WGwJJb4/WGA0wr+jTZtaZ3Otfj7UCLiJJes:1XbbG5mbbGVbbGobbGABr+dCe6GU

Malware Config

Signatures

  • Detected Ploutus loader 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Ploutus

    Ploutus is an ATM malware written in C#.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66f0d151d9994cc5811c746d48265e60N.exe
    "C:\Users\Admin\AppData\Local\Temp\66f0d151d9994cc5811c746d48265e60N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • \??\c:\users\admin\appdata\local\temp\66f0d151d9994cc5811c746d48265e60n.exe 
      c:\users\admin\appdata\local\temp\66f0d151d9994cc5811c746d48265e60n.exe 
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2232
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2736
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2620
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:320
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1624
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2836
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 08:24 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:2700
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "svchost" /tr "c:\windows\resources\svchost.exe" /sc daily /st 08:25 /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:1316
        • C:\Windows\Explorer.exe
          C:\Windows\Explorer.exe
          4⤵
            PID:2588

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Scheduled Task/Job

    1
    T1053

    Scheduled Task

    1
    T1053.005

    Defense Evasion

    Hide Artifacts

    1
    T1564

    Hidden Files and Directories

    1
    T1564.001

    Modify Registry

    2
    T1112

    Discovery

    System Location Discovery

    1
    T1614

    System Language Discovery

    1
    T1614.001

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\X360CE\x360ce.Presets.xml
      Filesize

      182B

      MD5

      f135ee37bdc2bee6bf638994e6a94f0b

      SHA1

      4760b3c9a1bc86f8b57891cedd01ba76a6552e8c

      SHA256

      5a1e6a26433d1c1d5b72ecf67ca89dba3ef9a35192b23640911bbf232c21b458

      SHA512

      94346c7cf89c39440635ce876cba9b56571f7c40372a13717b565d202258586714932a3fcafdd6bbf64b91cc4a924b686de3ab9c2f53afcd6b77e801c1f1d785

    • C:\Users\Admin\AppData\Local\Temp\CabB711.tmp
      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarB734.tmp
      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Windows\Resources\Themes\explorer.exe
      Filesize

      135KB

      MD5

      d80a198a9c74faf3b896f1e30eb77f24

      SHA1

      95a6302ede32415886dd299dac6800c5371ad49b

      SHA256

      f18218f0a264ae75981c4fbbb81ed71f45a034f6433cf12966adf783715074ae

      SHA512

      8abd60b13681651cbc3cd0336a4c25a6ce305fdebf30a6ea18daa422c347c27922af26ca3d036de0e2a913107b6b0aaede3cae369412ce9a4c8ccda928b34d82

    • C:\Windows\Resources\Themes\icsys.icn.exe
      Filesize

      135KB

      MD5

      2e6baef9ae7870e20c45064147abc8a7

      SHA1

      94ab5ab24e5c57b103396b1a2e796906e02a995a

      SHA256

      6fab554124b66e3771863dd771909cf08eb1d3a1dfb9dec97552ee15913a24cd

      SHA512

      909e32bf2722522b3d1078fab3e87f74a66df732297b0ffd2bab7c5700f85147d96dda7f0c824da5c6121a2287b0122d5ed979712441f04385de34667e139b90

    • \Users\Admin\AppData\Local\Temp\66f0d151d9994cc5811c746d48265e60n.exe 
      Filesize

      3.1MB

      MD5

      b6e5bd3c6abd734ac9d66f7dbcdb8409

      SHA1

      485e46c4dcf4d1274eae63932c024bdf9fc52e34

      SHA256

      28e424c515f3724c872fc1d5d79709fa9d13e7986c47fb678b90a677a225abf5

      SHA512

      2e825c315db6761af99385d6be13308bc0f111d024b8a0e9e22d806d54b8312c1864f08799b73ee7b441719fb81d57000cfc5ce7ddc118745ca41226858db67b

    • \Users\Admin\AppData\Local\Temp\xinput_X86.tmp.dll
      Filesize

      123KB

      MD5

      5236623449893c0e1e98fc95f067fcff

      SHA1

      50b4f1e2340b7c7ad065b2111fc075b2cafe6231

      SHA256

      301f0d831d95bb5c3b5c57f8a92a35211531b410fcf2bd08927a286b867142a3

      SHA512

      9b94bddcb5e64bbf3649567f16a828588423873b60858d45c40155f36cc7f95d205f4e9b6cdc8ac2852240fdb6a67d0940c60e4f103cecbf118eae1438019c0c

    • \Windows\Resources\spoolsv.exe
      Filesize

      135KB

      MD5

      65990c1cb89a28271cb77ee737f2ade0

      SHA1

      75ac156741165fe6e48e601b8a914c29c7b5aafe

      SHA256

      9a4c3ad5e62aaa513b665aa2dfd7b232f1181aa23fd61a2100fb965fd1d7d9c4

      SHA512

      90a3a57f7fef63ba0ea8c2939d44c825b3c76e4e6653db48c6708d6cd5ddc6c4acec9891d7ca4de1a91a718d88c7bf21e68752108b4b803b5e6894895d116379

    • \Windows\Resources\svchost.exe
      Filesize

      135KB

      MD5

      2c2472fe67884e4b9020a7ca95aa4f7a

      SHA1

      a9882103262c95532b18c6e2152e9bbbaa068393

      SHA256

      13b432711243dc3a4b8a6f4cb5e4fa14ae41298df61105267e4f6b4341515c3f

      SHA512

      ca5a53c4f4bb3802ab268bc9c65c26a88717ae6c38704af0e565c569c15fbeef4f12ed3a8b5f5bc4ffc36156334a79d65730bcf948e6ae011df7e126080dd41b

    • memory/320-100-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/320-121-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/1624-117-0x0000000000420000-0x000000000043F000-memory.dmp
      Filesize

      124KB

    • memory/2032-77-0x0000000000280000-0x000000000029F000-memory.dmp
      Filesize

      124KB

    • memory/2032-1-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2032-123-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2232-68-0x0000000005B40000-0x0000000005BCE000-memory.dmp
      Filesize

      568KB

    • memory/2232-70-0x0000000074730000-0x0000000074E1E000-memory.dmp
      Filesize

      6.9MB

    • memory/2232-69-0x0000000000890000-0x00000000008D4000-memory.dmp
      Filesize

      272KB

    • memory/2232-67-0x0000000000630000-0x000000000065C000-memory.dmp
      Filesize

      176KB

    • memory/2232-12-0x00000000010E0000-0x00000000013F4000-memory.dmp
      Filesize

      3.1MB

    • memory/2232-11-0x000000007473E000-0x000000007473F000-memory.dmp
      Filesize

      4KB

    • memory/2232-149-0x000000007473E000-0x000000007473F000-memory.dmp
      Filesize

      4KB

    • memory/2232-150-0x0000000074730000-0x0000000074E1E000-memory.dmp
      Filesize

      6.9MB

    • memory/2736-87-0x0000000000510000-0x000000000052F000-memory.dmp
      Filesize

      124KB

    • memory/2736-78-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2736-122-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2836-118-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB

    • memory/2836-120-0x0000000000400000-0x000000000041F000-memory.dmp
      Filesize

      124KB