Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 15:43
Static task
static1
Behavioral task
behavioral1
Sample
PS/RsTray.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PS/RsTray.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
PS/comserv.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
PS/comserv.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PS/comserv.dll.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PS/comserv.dll.url
Resource
win10v2004-20240802-en
General
-
Target
PS/RsTray.exe
-
Size
174KB
-
MD5
d65adc7ad95e88fab486707b8c228f17
-
SHA1
dfa0589b58a469e34695a22313d184e5352a3282
-
SHA256
a3674fef407c354e911a8a6c7d4b991802c47cf6409d6dc32dc84be6312159e2
-
SHA512
3c9114610dfc107adec6a6220356607c737499866eba965985bb1f6b9aedbfae529a5432abb8307ce0653580fab9c2580c66d96ef4cdb4319a0fde5ad3c3ac01
-
SSDEEP
3072:wq1/mmpPCL8OZwevvCRmvUGmeU1hbFZJslQLRzMaZ:wUmqCL8Oj3XZm5jNLRzVZ
Malware Config
Signatures
-
Detects PlugX payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2948-1-0x0000000001DE0000-0x0000000001E11000-memory.dmp family_plugx behavioral1/memory/3004-19-0x0000000000340000-0x0000000000371000-memory.dmp family_plugx behavioral1/memory/3048-26-0x00000000001D0000-0x0000000000201000-memory.dmp family_plugx behavioral1/memory/3004-28-0x0000000000340000-0x0000000000371000-memory.dmp family_plugx behavioral1/memory/2948-35-0x0000000001DE0000-0x0000000001E11000-memory.dmp family_plugx behavioral1/memory/3048-53-0x00000000001D0000-0x0000000000201000-memory.dmp family_plugx behavioral1/memory/3048-49-0x00000000001D0000-0x0000000000201000-memory.dmp family_plugx behavioral1/memory/3048-47-0x00000000001D0000-0x0000000000201000-memory.dmp family_plugx behavioral1/memory/3048-48-0x00000000001D0000-0x0000000000201000-memory.dmp family_plugx behavioral1/memory/3048-36-0x00000000001D0000-0x0000000000201000-memory.dmp family_plugx behavioral1/memory/2536-66-0x00000000002C0000-0x00000000002F1000-memory.dmp family_plugx behavioral1/memory/2536-73-0x00000000002C0000-0x00000000002F1000-memory.dmp family_plugx behavioral1/memory/2536-72-0x00000000002C0000-0x00000000002F1000-memory.dmp family_plugx behavioral1/memory/3048-74-0x00000000001D0000-0x0000000000201000-memory.dmp family_plugx behavioral1/memory/2536-75-0x00000000002C0000-0x00000000002F1000-memory.dmp family_plugx behavioral1/memory/3048-78-0x00000000001D0000-0x0000000000201000-memory.dmp family_plugx behavioral1/memory/3048-79-0x00000000001D0000-0x0000000000201000-memory.dmp family_plugx -
Deletes itself 1 IoCs
Processes:
svchost.exepid process 3048 svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
RsTray.exepid process 3004 RsTray.exe -
Loads dropped DLL 1 IoCs
Processes:
RsTray.exepid process 3004 RsTray.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
RsTray.exeRsTray.exesvchost.exemsiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RsTray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RsTray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Modifies data under HKEY_USERS 12 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\WpadDecisionTime = 70dff2ba2a05db01 svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\WpadNetworkName = "Network 3" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\ce-8d-06-b5-65-54 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-8d-06-b5-65-54\WpadDecisionReason = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-8d-06-b5-65-54\WpadDecision = "0" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-8d-06-b5-65-54\WpadDetectedUrl svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1} svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{ECCB368C-2ACD-4C95-8D23-3AE13CFBD4A1}\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-8d-06-b5-65-54 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-8d-06-b5-65-54\WpadDecisionTime = 70dff2ba2a05db01 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe -
Modifies registry class 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 35003800380044004200350036003000460032003900300032003800330042000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exemsiexec.exepid process 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 3048 svchost.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 3048 svchost.exe 3048 svchost.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 3048 svchost.exe 3048 svchost.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 3048 svchost.exe 3048 svchost.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 3048 svchost.exe 3048 svchost.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe 2536 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
svchost.exemsiexec.exepid process 3048 svchost.exe 2536 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
RsTray.exeRsTray.exesvchost.exemsiexec.exedescription pid process Token: SeDebugPrivilege 2948 RsTray.exe Token: SeTcbPrivilege 2948 RsTray.exe Token: SeDebugPrivilege 3004 RsTray.exe Token: SeTcbPrivilege 3004 RsTray.exe Token: SeDebugPrivilege 3048 svchost.exe Token: SeTcbPrivilege 3048 svchost.exe Token: SeDebugPrivilege 2536 msiexec.exe Token: SeTcbPrivilege 2536 msiexec.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
RsTray.exesvchost.exedescription pid process target process PID 3004 wrote to memory of 3048 3004 RsTray.exe svchost.exe PID 3004 wrote to memory of 3048 3004 RsTray.exe svchost.exe PID 3004 wrote to memory of 3048 3004 RsTray.exe svchost.exe PID 3004 wrote to memory of 3048 3004 RsTray.exe svchost.exe PID 3004 wrote to memory of 3048 3004 RsTray.exe svchost.exe PID 3004 wrote to memory of 3048 3004 RsTray.exe svchost.exe PID 3004 wrote to memory of 3048 3004 RsTray.exe svchost.exe PID 3004 wrote to memory of 3048 3004 RsTray.exe svchost.exe PID 3004 wrote to memory of 3048 3004 RsTray.exe svchost.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe PID 3048 wrote to memory of 2536 3048 svchost.exe msiexec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PS\RsTray.exe"C:\Users\Admin\AppData\Local\Temp\PS\RsTray.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
C:\ProgramData\PS\RsTray.exeC:\ProgramData\PS\RsTray.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 30483⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD5d65adc7ad95e88fab486707b8c228f17
SHA1dfa0589b58a469e34695a22313d184e5352a3282
SHA256a3674fef407c354e911a8a6c7d4b991802c47cf6409d6dc32dc84be6312159e2
SHA5123c9114610dfc107adec6a6220356607c737499866eba965985bb1f6b9aedbfae529a5432abb8307ce0653580fab9c2580c66d96ef4cdb4319a0fde5ad3c3ac01
-
Filesize
2KB
MD56d54b4f07a1b92bd6fafe7160b2c887c
SHA16bf4a36e729a2c4156b1280db97252ba8ea7d9b4
SHA256653fe0ab7b634e50ba09f962c6357bcf76ce633768aa41dd01d1a93ef83a0a54
SHA51232c57ca7ce437fc7712948a6f30733112830ff570d89ca903e5a5bdec43277a19a453df8c027e0835ad1dff2f7927cf973e33efa1847ed608cb6eb534d8163a3
-
Filesize
122KB
MD5fe14ef97d52c1c4f4764c36b76f18340
SHA160a931c6607ffe7dabdce33151f7d217b7581175
SHA256d8c68c81908ca0b31a773cf78bc59b9d886ba72177b2b4f5a1d9ea46b95ce05e
SHA512390366a82817d8e841084744cd879bd7be6ce1dff85e26e9fe4739b709c17718c4e836f2f543c1d84f47096230e2d9dbc6dab6c597acc8ae802c43b1d4ae7f0d
-
Filesize
782B
MD5a6867dd99428722d3f814601082c0e29
SHA1690746c6c9622fc188fd115a8627cc435747a28a
SHA256116916cd4346fc94ac2c785b64077527defb80be59090ce5fbfaee8716374071
SHA5129264ee43457c168046e73f08a788686f2b7a78f1eca36b2b002f7b7aad24b39e383195861ccefe16143e4306cdf6a794c75287d9c72c9682cf493a21e356bc82
-
Filesize
1KB
MD5230800a41ca47fe983c23b3fd6cc75c7
SHA193c3b7029384f81437334eb7b98485a5c7408acc
SHA2565c602b5d7aa272d4803a3dba6e73082d39728831c2f9c2930314ffef962f53c0
SHA512cf271e74de9184086280855a2d478496e79eda914738edbb74e14a9fa02413dac953028171cc7e8f21044b29bdc1c76eb7a73f74d09808982c81d4c9d9bef7ae
-
Filesize
1KB
MD58fbed73bbccf2de04e92c67cfe395d2a
SHA1391e3dc99feb62811af2c4f67dfddd6715f6424a
SHA2567e26ac0ee46294946dcec627412282a8ff459be3db2778dba15e834a46bfc599
SHA5129ca0bc9137d3c02c118a4becfa83119b9e36d580ce12d44639f4407e15fdf57cf154d07b96829de835fc1cb4d0d194abd38aeca0191a9b5e1d8e77873b6c0c07