Analysis

  • max time kernel
    120s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2024 08:22

General

  • Target

    66f0d151d9994cc5811c746d48265e60N.exe

  • Size

    3.2MB

  • MD5

    66f0d151d9994cc5811c746d48265e60

  • SHA1

    455ad3c941653dbfd4b0727527d67344dcf96865

  • SHA256

    8b097b6ebfe177d49434f4d632ce912792d52c149f431dd51c8e8631110abefa

  • SHA512

    f54b4a99782fda97530d79fb48776d8b3641d530c31c0fd2ac327ba6fbaf899bb3d39cc3b57a1973b63596ea59b1ddec8999f03705b0fd2ccac3f5b627f23bfe

  • SSDEEP

    49152:t5NbfJJb4/WGdvbKJJb4/WGBJJb4/WGwJJb4/WGA0wr+jTZtaZ3Otfj7UCLiJJes:1XbbG5mbbGVbbGobbGABr+dCe6GU

Malware Config

Signatures

  • Detected Ploutus loader 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Ploutus

    Ploutus is an ATM malware written in C#.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66f0d151d9994cc5811c746d48265e60N.exe
    "C:\Users\Admin\AppData\Local\Temp\66f0d151d9994cc5811c746d48265e60N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2432
    • \??\c:\users\admin\appdata\local\temp\66f0d151d9994cc5811c746d48265e60n.exe 
      c:\users\admin\appdata\local\temp\66f0d151d9994cc5811c746d48265e60n.exe 
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2720
    • C:\Windows\Resources\Themes\icsys.icn.exe
      C:\Windows\Resources\Themes\icsys.icn.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4848
      • \??\c:\windows\resources\themes\explorer.exe
        c:\windows\resources\themes\explorer.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4420
        • \??\c:\windows\resources\spoolsv.exe
          c:\windows\resources\spoolsv.exe SE
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3848
          • \??\c:\windows\resources\svchost.exe
            c:\windows\resources\svchost.exe
            5⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2972
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe PR
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2184

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

3
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\X360CE\x360ce.Presets.xml
    Filesize

    182B

    MD5

    f135ee37bdc2bee6bf638994e6a94f0b

    SHA1

    4760b3c9a1bc86f8b57891cedd01ba76a6552e8c

    SHA256

    5a1e6a26433d1c1d5b72ecf67ca89dba3ef9a35192b23640911bbf232c21b458

    SHA512

    94346c7cf89c39440635ce876cba9b56571f7c40372a13717b565d202258586714932a3fcafdd6bbf64b91cc4a924b686de3ab9c2f53afcd6b77e801c1f1d785

  • C:\Users\Admin\AppData\Local\Temp\66f0d151d9994cc5811c746d48265e60n.exe 
    Filesize

    3.1MB

    MD5

    b6e5bd3c6abd734ac9d66f7dbcdb8409

    SHA1

    485e46c4dcf4d1274eae63932c024bdf9fc52e34

    SHA256

    28e424c515f3724c872fc1d5d79709fa9d13e7986c47fb678b90a677a225abf5

    SHA512

    2e825c315db6761af99385d6be13308bc0f111d024b8a0e9e22d806d54b8312c1864f08799b73ee7b441719fb81d57000cfc5ce7ddc118745ca41226858db67b

  • C:\Users\Admin\AppData\Local\Temp\xinput_Amd64.tmp.dll
    Filesize

    123KB

    MD5

    5236623449893c0e1e98fc95f067fcff

    SHA1

    50b4f1e2340b7c7ad065b2111fc075b2cafe6231

    SHA256

    301f0d831d95bb5c3b5c57f8a92a35211531b410fcf2bd08927a286b867142a3

    SHA512

    9b94bddcb5e64bbf3649567f16a828588423873b60858d45c40155f36cc7f95d205f4e9b6cdc8ac2852240fdb6a67d0940c60e4f103cecbf118eae1438019c0c

  • C:\Windows\Resources\Themes\explorer.exe
    Filesize

    135KB

    MD5

    7486da416a6496cd3be4149eb8ec9e92

    SHA1

    a8489d18fc111692ae8876a4d7a0a59b558f1a4f

    SHA256

    5464be71ba1c4c704cd09f3f72bda4bf0e8da77303ac476bb8a850938ba75f5e

    SHA512

    3c74723c343d48904ee56c713cb12cf9b3758776fc400dfef32bf60af9cd5a43afa31d71a950256a0dd0e71dbf3cb52acab24c96ae772d30df009b23ad314ec0

  • C:\Windows\Resources\Themes\icsys.icn.exe
    Filesize

    135KB

    MD5

    2e6baef9ae7870e20c45064147abc8a7

    SHA1

    94ab5ab24e5c57b103396b1a2e796906e02a995a

    SHA256

    6fab554124b66e3771863dd771909cf08eb1d3a1dfb9dec97552ee15913a24cd

    SHA512

    909e32bf2722522b3d1078fab3e87f74a66df732297b0ffd2bab7c5700f85147d96dda7f0c824da5c6121a2287b0122d5ed979712441f04385de34667e139b90

  • C:\Windows\Resources\spoolsv.exe
    Filesize

    135KB

    MD5

    d8dabbf73aab1a5cdd025b140646ecbc

    SHA1

    2dd1f543c29c35469985295e6b64bad3846f8420

    SHA256

    48c75f01721b7034c76254f4d072b81ffa1da8b93825537c8875a27cf44882ed

    SHA512

    a22be46d7ad142c9c7efc9cae3628bda134431be0827a1fe7c74384b2c8127382b89da6bd90c6758cb685cd2bcd60fadf5a84b5073a6a522dcc7edfdca446507

  • C:\Windows\Resources\svchost.exe
    Filesize

    135KB

    MD5

    0a9cf5f75bb93da2275c0aa487fadd2d

    SHA1

    14d4ddd8d39b2bf50c498fd4a4d7f40c8083bb95

    SHA256

    75f66514489337a62e1fa77a6c0edd6f715bff56cc3de46af178efef19edf283

    SHA512

    e7bffb69a1f28a7f4a82097507e466e7328a70eafc61da6fc000ecf3c9598b62975cec10d465d0893f169bbf8402f2dde698cfef6703c1a7907c979abc325e22

  • memory/2184-67-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/2432-70-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/2432-0-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/2720-26-0x0000000005DC0000-0x0000000005DEC000-memory.dmp
    Filesize

    176KB

  • memory/2720-72-0x0000000007B30000-0x0000000007B50000-memory.dmp
    Filesize

    128KB

  • memory/2720-29-0x0000000074CF0000-0x00000000754A0000-memory.dmp
    Filesize

    7.7MB

  • memory/2720-94-0x0000000074CF0000-0x00000000754A0000-memory.dmp
    Filesize

    7.7MB

  • memory/2720-28-0x0000000005EA0000-0x0000000005EE4000-memory.dmp
    Filesize

    272KB

  • memory/2720-27-0x0000000005E00000-0x0000000005E8E000-memory.dmp
    Filesize

    568KB

  • memory/2720-13-0x0000000004E50000-0x0000000004EE2000-memory.dmp
    Filesize

    584KB

  • memory/2720-93-0x0000000074CFE000-0x0000000074CFF000-memory.dmp
    Filesize

    4KB

  • memory/2720-12-0x0000000004D90000-0x0000000004DAA000-memory.dmp
    Filesize

    104KB

  • memory/2720-9-0x0000000074CFE000-0x0000000074CFF000-memory.dmp
    Filesize

    4KB

  • memory/2720-11-0x00000000054C0000-0x0000000005A64000-memory.dmp
    Filesize

    5.6MB

  • memory/2720-10-0x0000000000100000-0x0000000000414000-memory.dmp
    Filesize

    3.1MB

  • memory/2720-71-0x00000000096F0000-0x0000000009ACA000-memory.dmp
    Filesize

    3.9MB

  • memory/2720-30-0x0000000006F60000-0x0000000006F6A000-memory.dmp
    Filesize

    40KB

  • memory/2720-73-0x0000000009AD0000-0x0000000009E24000-memory.dmp
    Filesize

    3.3MB

  • memory/2972-62-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/3848-68-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/4848-69-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB

  • memory/4848-34-0x0000000000400000-0x000000000041F000-memory.dmp
    Filesize

    124KB