Resubmissions

30-12-2024 19:51

241230-yk1f8awkfk 10

20-09-2024 23:58

240920-31bv1svgna 10

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2024 19:51

General

  • Target

    originalfile/PlugX_RTF_dropper_42fba80f105aa53dfbf50aeba2d73cae.rtf

  • Size

    507KB

  • MD5

    42fba80f105aa53dfbf50aeba2d73cae

  • SHA1

    a49b135a66afba5713936d4758ca5d40f19b9e71

  • SHA256

    ac7d02465d0b1992809e16aaae2cd779470a99e0860c4d8a2785d97ce988667b

  • SHA512

    b42b529585da21bae4d36fb1e9b5f2471e77d87505db91f8859068816d355fdd8b4aaaa922512a8a39259b247b9aeaeba92cfb0ab5140122f83dd163b8ed00cf

  • SSDEEP

    6144:h5LReC+jODUJ6aCujPjtNbShm6YNYa2Zg3:h5o3jOU6aCCtw8p

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\originalfile\PlugX_RTF_dropper_42fba80f105aa53dfbf50aeba2d73cae.rtf" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\EC0AB685-5447-4AF3-BC06-C521BD113CEB

      Filesize

      3B

      MD5

      8a80554c91d9fca8acb82f023de02f11

      SHA1

      5f36b2ea290645ee34d943220a14b54ee5ea5be5

      SHA256

      ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

      SHA512

      ca4b6defb8adcc010050bc8b1bb8f8092c4928b8a0fba32146abcfb256e4d91672f88ca2cdf6210e754e5b8ac5e23fb023806ccd749ac8b701f79a691f03c87a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\9AB499C.wmf

      Filesize

      642B

      MD5

      4f03b86e4d6631c26ff5fffc7332be1d

      SHA1

      14952a78ea51df67d5b5b6c6b4de3d96ba7935bd

      SHA256

      83f4ea26254d69825486bffd1d400217aac7245c5c48fe5acc3ccdea173c4851

      SHA512

      4bed29b66444d826e89589b55dd786758ff68fcd2daf8296703d4443edb991fffce563e20db22bfb34fdb488638bbb43252392b6c105d12e721329adc2774632

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      3KB

      MD5

      17308575843dbb1c3ed61c7a2a9ee765

      SHA1

      05474368ea631304a55f475af74729d937aaec52

      SHA256

      e1dc4ecfc2253626d22063a02482c271e12b01746db48be4cdf93338890a58a1

      SHA512

      fa316b80a80eb8e29adca01ac2f753e701b2b14daa1c51bd8b15d54717bef48141962df58f187fc70c6fae4e60b8a210d6b40db91240ce15502f659e1c60a53e

    • memory/2192-15-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-11-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-5-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-6-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-8-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/2192-7-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-12-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-14-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-16-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-1-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/2192-17-0x00007FFCE8110000-0x00007FFCE8120000-memory.dmp

      Filesize

      64KB

    • memory/2192-2-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/2192-10-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-9-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-18-0x00007FFCE8110000-0x00007FFCE8120000-memory.dmp

      Filesize

      64KB

    • memory/2192-13-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-3-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/2192-35-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-36-0x00007FFD2A1ED000-0x00007FFD2A1EE000-memory.dmp

      Filesize

      4KB

    • memory/2192-37-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-38-0x00007FFD2A150000-0x00007FFD2A345000-memory.dmp

      Filesize

      2.0MB

    • memory/2192-4-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/2192-0-0x00007FFD2A1ED000-0x00007FFD2A1EE000-memory.dmp

      Filesize

      4KB