Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
AvastSvcpCP/AvastSvc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AvastSvcpCP/AvastSvc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AvastSvcpCP/wsc.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
AvastSvcpCP/wsc.dll
Resource
win10v2004-20241007-en
General
-
Target
AvastSvcpCP/AvastSvc.exe
-
Size
60KB
-
MD5
a72036f635cecf0dcb1e9c6f49a8fa5b
-
SHA1
049813b955db1dd90952657ae2bd34250153563e
-
SHA256
85ca20eeec3400c68a62639a01928a5dab824d2eadf589e5cbfe5a2bc41d9654
-
SHA512
e3582e0969361d272c2469ce139ec809b9b0ac98fbc5eb5bb287442aed4c6ba69ed8175b68970751c93730cfaf07b75c3bc5e4e24aeda8f984b24f33bb8e3da2
-
SSDEEP
768:Q/WQ3/TymxfsHYPry0bgYh3LKgMoCDGFh9D:Q+QvT7xUHYPDbgYVLWofD
Malware Config
Extracted
plugx
45.142.166.112:443
45.142.166.112:110
-
folder
AvastSvcpCP
Signatures
-
Plugx family
-
Executes dropped EXE 1 IoCs
pid Process 2412 AvastSvc.exe -
Loads dropped DLL 3 IoCs
pid Process 1972 AvastSvc.exe 1972 AvastSvc.exe 2412 AvastSvc.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AvastSvcpCP = "\"C:\\ProgramData\\AvastSvcpCP\\AvastSvc.exe\" 518" AvastSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\AvastSvcpCP = "\"C:\\ProgramData\\AvastSvcpCP\\AvastSvc.exe\" 518" AvastSvc.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: AvastSvc.exe File opened (read-only) \??\F: AvastSvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AvastSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AvastSvc.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu AvastSvc.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\ms-pu AvastSvc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu\CLSID = 31003500450038003100300042004300320030003500340042004400430036000000 AvastSvc.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu AvastSvc.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu\PROXY AvastSvc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2412 AvastSvc.exe 2412 AvastSvc.exe 2412 AvastSvc.exe 2412 AvastSvc.exe 2412 AvastSvc.exe 2412 AvastSvc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2412 AvastSvc.exe Token: SeDebugPrivilege 2412 AvastSvc.exe Token: SeTcbPrivilege 2412 AvastSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2412 1972 AvastSvc.exe 30 PID 1972 wrote to memory of 2412 1972 AvastSvc.exe 30 PID 1972 wrote to memory of 2412 1972 AvastSvc.exe 30 PID 1972 wrote to memory of 2412 1972 AvastSvc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\AvastSvcpCP\AvastSvc.exe"C:\Users\Admin\AppData\Local\Temp\AvastSvcpCP\AvastSvc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\ProgramData\AvastSvcpCP\AvastSvc.exeC:\ProgramData\AvastSvcpCP\AvastSvc.exe 5182⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD5ebb7749069a9b5bcda98d89f04d889db
SHA1c4ac1c5f4d3faa00ab846dceca67df3a51ad158b
SHA256432a07eb49473fa8c71d50ccaf2bc980b692d458ec4aaedd52d739cb377f3428
SHA512a0f75d7aea95d157d6674adbc454f672dd356c75901dfcd8a8defa78d0dc087ae4c092636428f46f613d232d25dd3eb1c00d1e1e2e69b30b3b23bd14532b91e9
-
Filesize
60KB
MD5a72036f635cecf0dcb1e9c6f49a8fa5b
SHA1049813b955db1dd90952657ae2bd34250153563e
SHA25685ca20eeec3400c68a62639a01928a5dab824d2eadf589e5cbfe5a2bc41d9654
SHA512e3582e0969361d272c2469ce139ec809b9b0ac98fbc5eb5bb287442aed4c6ba69ed8175b68970751c93730cfaf07b75c3bc5e4e24aeda8f984b24f33bb8e3da2
-
Filesize
80KB
MD5722b15bbc15845e4e265a1519c800c34
SHA156bac516227d9fddc08ca586dba5c9085d203f99
SHA256e8f55d0f327fd1d5f26428b890ef7fe878e135d494acda24ef01c695a2e9136d
SHA512a925614f3e89e37198d875670b3844449d6ab77728d53c1a06a5db035b7117a0b61cd8ada0022b6b5e0e8d6fad9417561a82cdbb5b288273c60b1469816a9d0d