Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 16:47
Static task
static1
Behavioral task
behavioral1
Sample
2d06415cf8ff8aacce1b0d994a269c52810c9324254a33a2bea0d134dc17b064.exe
Resource
win7-20241010-en
General
-
Target
2d06415cf8ff8aacce1b0d994a269c52810c9324254a33a2bea0d134dc17b064.exe
-
Size
218KB
-
MD5
046bb16fd2d9749e07fa07aeffd044d6
-
SHA1
692d905801968e4736e0a3ded2152d77b6a38088
-
SHA256
2d06415cf8ff8aacce1b0d994a269c52810c9324254a33a2bea0d134dc17b064
-
SHA512
78edaf9c5d326e73198343ee9126317f44325bbf29f255907a409dfbe1b5d301c97ecfb3b07f97ba7ba18fd40a1a977fb8bbb66118e5b65962ff00a957df295d
-
SSDEEP
6144:KLDyFXg3/QownR9XhQNnrJ0p4ELFvST08ku1tbn:K/F3YoqR9xWrJc4ERvS48/Tz
Malware Config
Signatures
-
Detects PlugX payload 19 IoCs
resource yara_rule behavioral2/memory/4132-14-0x00000000022A0000-0x00000000022CD000-memory.dmp family_plugx behavioral2/memory/3752-18-0x00000000005B0000-0x00000000005DD000-memory.dmp family_plugx behavioral2/memory/448-20-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/448-21-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/448-32-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/448-35-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/448-36-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/448-34-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/448-33-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/3752-40-0x00000000005B0000-0x00000000005DD000-memory.dmp family_plugx behavioral2/memory/4132-41-0x00000000022A0000-0x00000000022CD000-memory.dmp family_plugx behavioral2/memory/448-42-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/448-43-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/2956-46-0x0000000001050000-0x000000000107D000-memory.dmp family_plugx behavioral2/memory/2956-50-0x0000000001050000-0x000000000107D000-memory.dmp family_plugx behavioral2/memory/2956-47-0x0000000001050000-0x000000000107D000-memory.dmp family_plugx behavioral2/memory/2956-49-0x0000000001050000-0x000000000107D000-memory.dmp family_plugx behavioral2/memory/448-52-0x0000000000C90000-0x0000000000CBD000-memory.dmp family_plugx behavioral2/memory/2956-53-0x0000000001050000-0x000000000107D000-memory.dmp family_plugx -
Plugx family
-
Deletes itself 1 IoCs
pid Process 4132 NvSmart.exe -
Executes dropped EXE 2 IoCs
pid Process 4132 NvSmart.exe 3752 NvSmart.exe -
Loads dropped DLL 2 IoCs
pid Process 4132 NvSmart.exe 3752 NvSmart.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d06415cf8ff8aacce1b0d994a269c52810c9324254a33a2bea0d134dc17b064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NvSmart.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NvSmart.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Modifies data under HKEY_USERS 17 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 38003500410035003500460042003200310032003200460034004100440034000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 448 svchost.exe 448 svchost.exe 448 svchost.exe 448 svchost.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 448 svchost.exe 448 svchost.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 448 svchost.exe 448 svchost.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 448 svchost.exe 448 svchost.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 448 svchost.exe 448 svchost.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 2956 msiexec.exe 448 svchost.exe 448 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 448 svchost.exe 2956 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4132 NvSmart.exe Token: SeTcbPrivilege 4132 NvSmart.exe Token: SeDebugPrivilege 3752 NvSmart.exe Token: SeTcbPrivilege 3752 NvSmart.exe Token: SeDebugPrivilege 448 svchost.exe Token: SeTcbPrivilege 448 svchost.exe Token: SeDebugPrivilege 2956 msiexec.exe Token: SeTcbPrivilege 2956 msiexec.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3980 wrote to memory of 4132 3980 2d06415cf8ff8aacce1b0d994a269c52810c9324254a33a2bea0d134dc17b064.exe 82 PID 3980 wrote to memory of 4132 3980 2d06415cf8ff8aacce1b0d994a269c52810c9324254a33a2bea0d134dc17b064.exe 82 PID 3980 wrote to memory of 4132 3980 2d06415cf8ff8aacce1b0d994a269c52810c9324254a33a2bea0d134dc17b064.exe 82 PID 3752 wrote to memory of 448 3752 NvSmart.exe 84 PID 3752 wrote to memory of 448 3752 NvSmart.exe 84 PID 3752 wrote to memory of 448 3752 NvSmart.exe 84 PID 3752 wrote to memory of 448 3752 NvSmart.exe 84 PID 3752 wrote to memory of 448 3752 NvSmart.exe 84 PID 3752 wrote to memory of 448 3752 NvSmart.exe 84 PID 3752 wrote to memory of 448 3752 NvSmart.exe 84 PID 3752 wrote to memory of 448 3752 NvSmart.exe 84 PID 448 wrote to memory of 2956 448 svchost.exe 90 PID 448 wrote to memory of 2956 448 svchost.exe 90 PID 448 wrote to memory of 2956 448 svchost.exe 90 PID 448 wrote to memory of 2956 448 svchost.exe 90 PID 448 wrote to memory of 2956 448 svchost.exe 90 PID 448 wrote to memory of 2956 448 svchost.exe 90 PID 448 wrote to memory of 2956 448 svchost.exe 90 PID 448 wrote to memory of 2956 448 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d06415cf8ff8aacce1b0d994a269c52810c9324254a33a2bea0d134dc17b064.exe"C:\Users\Admin\AppData\Local\Temp\2d06415cf8ff8aacce1b0d994a269c52810c9324254a33a2bea0d134dc17b064.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\NVFILES\NvSmart.exe"C:\Users\Admin\AppData\Local\Temp\NVFILES\NvSmart.exe" 100 39802⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\NVFILES\NvSmart.exe"C:\Users\Admin\AppData\Local\Temp\NVFILES\NvSmart.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 4483⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD509b8b54f78a10c435cd319070aa13c28
SHA16474d0369f97e72e01e4971128d1062f5c2b3656
SHA256523d28df917f9d265cd2c0d38df26277bc56a535145100ed82e6f5fdeaae7256
SHA512c1f2f5c4aa5eb55d255e22db032da954a38a0204fb4d9bc76042f140f1b1e171944aa09b0eb11159323a8b9f33974c73fd32a4f76d976aaa8a16cc9c60a34ca7
-
Filesize
40KB
MD5532bcd7258d35fabbfeca5910de8a96f
SHA15cf9fbb7afacd602f0df46b64782aae62beaf8fd
SHA2568d5749552fa4698178ee46c09e8d1fc9c30322583a8301c3d092135d027d7019
SHA512414c2e57e0b59c320ca53551021824b1eb507067c0c6a6f3d27683699f0a2977dd3a21211a1a16e8d5639f81028dce30c4ca7ec5420346f92de0cf53695f9f3b
-
Filesize
113KB
MD56a6ace55c125a82ce2515f11c263fa0f
SHA1cd9752a4d0aa883ded211e6765d7b11d48e864a3
SHA256e116af18781cc79d61bfff8db9ae7f67366b72260d858fbbfb898ac81877d4b2
SHA51244a05ecab291740c7e374f8c5239f27a96caaae47be5489d85cf41f3249e2608b8e37edf66b0aa9b3fa7ce256ed8a9746508ebff9488311fe4252bbef5291889