Resubmissions
11-09-2024 00:30
240911-athqrssfkq 10Analysis
-
max time kernel
299s -
max time network
298s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
ArainsToolser/arpReport.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ArainsToolser/arpReport.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
ArainsToolser/arphadump.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
ArainsToolser/arphadump.dll
Resource
win10v2004-20240802-en
General
-
Target
ArainsToolser/arpReport.exe
-
Size
189KB
-
MD5
e9d05f7176aab86c6754ba89cb06d768
-
SHA1
f0e80278eab18ed61dcb473fb42419186fcc8b35
-
SHA256
6840e6e2a2b4555db025c331b41d426387e8d6397fd5917fad29d3893fb1886f
-
SHA512
100b1020ac2d67b10d5ff7f7b3423b0706fa0250c90dad9d0155064e52ab6bb2226e8cd9be4ea5e8eba91b91d5f399e82ec166fef0a9fef3cccc35963113fda1
-
SSDEEP
3072:SJg3FNLpWK6weGrE8tU3xvz0tcK4hYanD9EvQiorztXkF6ODVgCl4LDVXcCSfHR9:SJgVV8K6VGrE8y3CtcKn6yv8zRkDVK5w
Malware Config
Signatures
-
Detects PlugX payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1908-2-0x00000000001D0000-0x0000000000206000-memory.dmp family_plugx behavioral1/memory/1908-5-0x00000000001D0000-0x0000000000206000-memory.dmp family_plugx behavioral1/memory/2172-27-0x0000000000240000-0x0000000000276000-memory.dmp family_plugx behavioral1/memory/2804-34-0x0000000000160000-0x0000000000196000-memory.dmp family_plugx behavioral1/memory/2600-46-0x0000000000260000-0x0000000000296000-memory.dmp family_plugx behavioral1/memory/1908-63-0x00000000001D0000-0x0000000000206000-memory.dmp family_plugx behavioral1/memory/2600-64-0x0000000000260000-0x0000000000296000-memory.dmp family_plugx behavioral1/memory/2804-61-0x0000000000160000-0x0000000000196000-memory.dmp family_plugx behavioral1/memory/2600-60-0x0000000000260000-0x0000000000296000-memory.dmp family_plugx behavioral1/memory/2600-58-0x0000000000260000-0x0000000000296000-memory.dmp family_plugx behavioral1/memory/2600-59-0x0000000000260000-0x0000000000296000-memory.dmp family_plugx behavioral1/memory/2600-45-0x0000000000260000-0x0000000000296000-memory.dmp family_plugx behavioral1/memory/2600-66-0x0000000000260000-0x0000000000296000-memory.dmp family_plugx behavioral1/memory/2172-70-0x0000000000240000-0x0000000000276000-memory.dmp family_plugx behavioral1/memory/2792-80-0x00000000002F0000-0x0000000000326000-memory.dmp family_plugx behavioral1/memory/2792-81-0x00000000002F0000-0x0000000000326000-memory.dmp family_plugx behavioral1/memory/2792-79-0x00000000002F0000-0x0000000000326000-memory.dmp family_plugx behavioral1/memory/2792-77-0x00000000002F0000-0x0000000000326000-memory.dmp family_plugx behavioral1/memory/2792-76-0x00000000002F0000-0x0000000000326000-memory.dmp family_plugx behavioral1/memory/2600-82-0x0000000000260000-0x0000000000296000-memory.dmp family_plugx -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 18.141.169.162 Destination IP 18.141.169.162 Destination IP 18.141.169.162 Destination IP 18.141.169.162 -
Deletes itself 1 IoCs
Processes:
arpReport.exepid process 2172 arpReport.exe -
Drops file in Program Files directory 8 IoCs
Processes:
arpReport.exemsdt.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\arphadump.dll arpReport.exe File created C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\arphadump.dll arpReport.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\DIFxAPI.bpl arpReport.exe File created C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\DIFxAPI.bpl arpReport.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\arpReport.exe arpReport.exe File created C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\arpReport.exe arpReport.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\NvSmart.hlp msdt.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ArainsToolser arpReport.exe -
Executes dropped EXE 2 IoCs
Processes:
arpReport.exearpReport.exepid process 2172 arpReport.exe 2804 arpReport.exe -
Loads dropped DLL 2 IoCs
Processes:
arpReport.exearpReport.exepid process 2172 arpReport.exe 2804 arpReport.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
msdt.exearpReport.exearpReport.exearpReport.exeDism.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arpReport.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arpReport.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language arpReport.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dism.exe -
Modifies registry class 2 IoCs
Processes:
Dism.exedescription ioc process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST Dism.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 36003500370032004500370042003100300039003500460035003700310039000000 Dism.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
Dism.exemsdt.exepid process 2600 Dism.exe 2792 msdt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
arpReport.exearpReport.exeDism.exemsdt.exepid process 1908 arpReport.exe 1908 arpReport.exe 2172 arpReport.exe 2600 Dism.exe 2600 Dism.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2600 Dism.exe 2600 Dism.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2600 Dism.exe 2600 Dism.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2600 Dism.exe 2600 Dism.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2600 Dism.exe 2600 Dism.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2792 msdt.exe 2600 Dism.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Dism.exemsdt.exepid process 2600 Dism.exe 2792 msdt.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
arpReport.exearpReport.exearpReport.exeDism.exemsdt.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 1908 arpReport.exe Token: SeTcbPrivilege 1908 arpReport.exe Token: SeDebugPrivilege 2172 arpReport.exe Token: SeTcbPrivilege 2172 arpReport.exe Token: SeDebugPrivilege 2804 arpReport.exe Token: SeTcbPrivilege 2804 arpReport.exe Token: SeDebugPrivilege 2600 Dism.exe Token: SeTcbPrivilege 2600 Dism.exe Token: SeDebugPrivilege 2792 msdt.exe Token: SeTcbPrivilege 2792 msdt.exe Token: 33 1264 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1264 AUDIODG.EXE Token: 33 1264 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1264 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
arpReport.exeDism.exedescription pid process target process PID 2804 wrote to memory of 2600 2804 arpReport.exe Dism.exe PID 2804 wrote to memory of 2600 2804 arpReport.exe Dism.exe PID 2804 wrote to memory of 2600 2804 arpReport.exe Dism.exe PID 2804 wrote to memory of 2600 2804 arpReport.exe Dism.exe PID 2804 wrote to memory of 2600 2804 arpReport.exe Dism.exe PID 2804 wrote to memory of 2600 2804 arpReport.exe Dism.exe PID 2804 wrote to memory of 2600 2804 arpReport.exe Dism.exe PID 2804 wrote to memory of 2600 2804 arpReport.exe Dism.exe PID 2804 wrote to memory of 2600 2804 arpReport.exe Dism.exe PID 2600 wrote to memory of 2792 2600 Dism.exe msdt.exe PID 2600 wrote to memory of 2792 2600 Dism.exe msdt.exe PID 2600 wrote to memory of 2792 2600 Dism.exe msdt.exe PID 2600 wrote to memory of 2792 2600 Dism.exe msdt.exe PID 2600 wrote to memory of 2792 2600 Dism.exe msdt.exe PID 2600 wrote to memory of 2792 2600 Dism.exe msdt.exe PID 2600 wrote to memory of 2792 2600 Dism.exe msdt.exe PID 2600 wrote to memory of 2792 2600 Dism.exe msdt.exe PID 2600 wrote to memory of 2792 2600 Dism.exe msdt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ArainsToolser\arpReport.exe"C:\Users\Admin\AppData\Local\Temp\ArainsToolser\arpReport.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\arpReport.exe"C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\arpReport.exe" 100 19081⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\arpReport.exe"C:\Program Files (x86)\Common Files\Adobe\ArainsToolser\arpReport.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Dism.exeC:\Windows\system32\Dism.exe 201 02⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\msdt.exeC:\Windows\system32\msdt.exe 209 26003⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2832
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2e01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD56d7a48328af8ac53d0331bca03f6e322
SHA141b14093804e44dc1865a595d1a8e63c918c0a29
SHA25686f32ad5c7048cd156d345bc86d4afc73a7be036a5b11aa08ac5b037249ba73e
SHA512207c525e14e18eb147f92bcc65186131e24168ff877c09eae3bd234c37401776a483bf56f105060c02c88d37935e23df8e759f4979dc7cdc71bad08bab6c3715
-
Filesize
189KB
MD5e9d05f7176aab86c6754ba89cb06d768
SHA1f0e80278eab18ed61dcb473fb42419186fcc8b35
SHA2566840e6e2a2b4555db025c331b41d426387e8d6397fd5917fad29d3893fb1886f
SHA512100b1020ac2d67b10d5ff7f7b3423b0706fa0250c90dad9d0155064e52ab6bb2226e8cd9be4ea5e8eba91b91d5f399e82ec166fef0a9fef3cccc35963113fda1
-
Filesize
7.2MB
MD5e4ac1288b36eb34ec356012716573a5c
SHA1dfaf779547b3989d72f75a91dbba20a3a15d4b96
SHA2569e10d98024db6f6748433918288232cc1e55bea916146729be40dc0e53615393
SHA5125f6921a62bee16a695215ead02fa10f6ae7ec844c9826a063824487519e03b0c674f6802273f13cb23e1daca2f7e9b9b723359d2b9aa9183821ec1234a334463