Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 17:44
Behavioral task
behavioral1
Sample
kdump64.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
kdump64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wps.dat
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
wps.dat
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
wps.exe
Resource
win7-20240903-en
General
-
Target
wps.exe
-
Size
177KB
-
MD5
f44992d14033a2b5b1064104658a29e1
-
SHA1
62673aa6e8bde17f218524cbe3bf50cb5b949f3b
-
SHA256
331f64d6d6bf7883ed8a3c29ab8ce3bf947aaecf49748a7a2b5113ced68607a4
-
SHA512
9a57d5765e9dcff8caccf8b51449bfd8d35f9c346c9a09a5c64a7229136490bc1cb5a3f07c8d9c75aaf48e16e01700c3d6674fc1b8d170ce927913c4130bc31b
-
SSDEEP
3072:65nSsRkXPsSadfviPNPVY5bYm1wkUBL/1cAR+oOb5vENb/fZOKeb0WhmNNdnLeny:65SsRkXPYGPG5cm6Bd3oEt/fZOaBi/fi
Malware Config
Signatures
-
Detects PlugX payload 22 IoCs
resource yara_rule behavioral5/memory/2648-4-0x0000000001CD0000-0x0000000001D0A000-memory.dmp family_plugx behavioral5/memory/2800-28-0x0000000001EE0000-0x0000000001F1A000-memory.dmp family_plugx behavioral5/memory/2800-29-0x0000000001EE0000-0x0000000001F1A000-memory.dmp family_plugx behavioral5/memory/1056-38-0x0000000001D30000-0x0000000001D6A000-memory.dmp family_plugx behavioral5/memory/1056-39-0x0000000001D30000-0x0000000001D6A000-memory.dmp family_plugx behavioral5/memory/2724-66-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx behavioral5/memory/2724-46-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx behavioral5/memory/2724-71-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx behavioral5/memory/2724-70-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx behavioral5/memory/1056-68-0x0000000001D30000-0x0000000001D6A000-memory.dmp family_plugx behavioral5/memory/2724-67-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx behavioral5/memory/2724-65-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx behavioral5/memory/2724-64-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx behavioral5/memory/2724-53-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx behavioral5/memory/2724-51-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx behavioral5/memory/2648-50-0x0000000001CD0000-0x0000000001D0A000-memory.dmp family_plugx behavioral5/memory/2800-76-0x0000000001EE0000-0x0000000001F1A000-memory.dmp family_plugx behavioral5/memory/2324-83-0x0000000000510000-0x000000000054A000-memory.dmp family_plugx behavioral5/memory/2324-87-0x0000000000510000-0x000000000054A000-memory.dmp family_plugx behavioral5/memory/2324-86-0x0000000000510000-0x000000000054A000-memory.dmp family_plugx behavioral5/memory/2324-88-0x0000000000510000-0x000000000054A000-memory.dmp family_plugx behavioral5/memory/2724-89-0x00000000002A0000-0x00000000002DA000-memory.dmp family_plugx -
Plugx family
-
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 103.43.18.19 -
resource yara_rule behavioral5/memory/2648-1-0x000007FEF7730000-0x000007FEF7774000-memory.dmp vmprotect behavioral5/memory/2648-0-0x000007FEF7730000-0x000007FEF7774000-memory.dmp vmprotect behavioral5/files/0x000f00000001866e-21.dat vmprotect behavioral5/memory/2800-23-0x000007FEF7620000-0x000007FEF7664000-memory.dmp vmprotect behavioral5/memory/2800-24-0x000007FEF7620000-0x000007FEF7664000-memory.dmp vmprotect behavioral5/memory/1056-34-0x000007FEF7620000-0x000007FEF7664000-memory.dmp vmprotect behavioral5/memory/1056-35-0x000007FEF7620000-0x000007FEF7664000-memory.dmp vmprotect behavioral5/memory/2648-37-0x000007FEF7730000-0x000007FEF7774000-memory.dmp vmprotect behavioral5/memory/1056-52-0x000007FEF7620000-0x000007FEF7664000-memory.dmp vmprotect behavioral5/memory/2800-75-0x000007FEF7620000-0x000007FEF7664000-memory.dmp vmprotect -
Deletes itself 1 IoCs
pid Process 2800 wps.exe -
Executes dropped EXE 3 IoCs
pid Process 2800 wps.exe 476 Process not Found 1056 wps.exe -
Loads dropped DLL 5 IoCs
pid Process 2108 Process not Found 2108 Process not Found 2800 wps.exe 476 Process not Found 1056 wps.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\~MHZ svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 36003600300035004300340046004600320045003600340035004100330041000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2648 wps.exe 2648 wps.exe 2800 wps.exe 2800 wps.exe 1056 wps.exe 1056 wps.exe 2724 svchost.exe 2724 svchost.exe 2724 svchost.exe 2724 svchost.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2724 svchost.exe 2724 svchost.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2724 svchost.exe 2724 svchost.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2724 svchost.exe 2724 svchost.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2724 svchost.exe 2724 svchost.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe 2324 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2724 svchost.exe 2324 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2648 wps.exe Token: SeTcbPrivilege 2648 wps.exe Token: SeDebugPrivilege 2800 wps.exe Token: SeTcbPrivilege 2800 wps.exe Token: SeDebugPrivilege 1056 wps.exe Token: SeTcbPrivilege 1056 wps.exe Token: SeDebugPrivilege 2724 svchost.exe Token: SeTcbPrivilege 2724 svchost.exe Token: SeDebugPrivilege 2324 msiexec.exe Token: SeTcbPrivilege 2324 msiexec.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2724 1056 wps.exe 33 PID 1056 wrote to memory of 2724 1056 wps.exe 33 PID 1056 wrote to memory of 2724 1056 wps.exe 33 PID 1056 wrote to memory of 2724 1056 wps.exe 33 PID 1056 wrote to memory of 2724 1056 wps.exe 33 PID 1056 wrote to memory of 2724 1056 wps.exe 33 PID 1056 wrote to memory of 2724 1056 wps.exe 33 PID 2724 wrote to memory of 2324 2724 svchost.exe 34 PID 2724 wrote to memory of 2324 2724 svchost.exe 34 PID 2724 wrote to memory of 2324 2724 svchost.exe 34 PID 2724 wrote to memory of 2324 2724 svchost.exe 34 PID 2724 wrote to memory of 2324 2724 svchost.exe 34 PID 2724 wrote to memory of 2324 2724 svchost.exe 34 PID 2724 wrote to memory of 2324 2724 svchost.exe 34 PID 2724 wrote to memory of 2324 2724 svchost.exe 34 PID 2724 wrote to memory of 2324 2724 svchost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\wps.exe"C:\Users\Admin\AppData\Local\Temp\wps.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
C:\ProgramData\Kingsoft\office6\wps.exe"C:\ProgramData\Kingsoft\office6\wps.exe" 100 26481⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
C:\ProgramData\Kingsoft\office6\wps.exe"C:\ProgramData\Kingsoft\office6\wps.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe 209 27243⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5d5dcfc5ac42bcba55a1170756f3493f4
SHA11bcefa919e0c9c1d114ed6384e4aff8f316482de
SHA2568ba00843b9aba2cff6f2234a7daf040aadfebce4c05b13061da63b48f63bfa4f
SHA512dbaf78188b53629d667bdcb4fcdc0c35045e77330bbe209739c86fbe2d7c2ba04b3adeedc6576186e1af20f8eb373a9788ed3b0050f80f61485475dcf23b0a24
-
Filesize
152KB
MD5a1ed676cf36394b6b4fb449309b91b5b
SHA14cf7a01b132e4855581e39f5d0da204301fdae98
SHA2568da2085b60e44aa5fa46c8613757e1582df098e27373b2c8916d2725f28b46de
SHA512ce224d2376a7d78777691f9eceb8a48755787b390b73e309d48337b8d097a9370e66780237e2884294c76205f93f27e82744804781abe8eaee255c9e2f0f3f11
-
Filesize
177KB
MD5f44992d14033a2b5b1064104658a29e1
SHA162673aa6e8bde17f218524cbe3bf50cb5b949f3b
SHA256331f64d6d6bf7883ed8a3c29ab8ce3bf947aaecf49748a7a2b5113ced68607a4
SHA5129a57d5765e9dcff8caccf8b51449bfd8d35f9c346c9a09a5c64a7229136490bc1cb5a3f07c8d9c75aaf48e16e01700c3d6674fc1b8d170ce927913c4130bc31b