Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 16:59
Static task
static1
Behavioral task
behavioral1
Sample
8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe
Resource
win7-20241010-en
General
-
Target
8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe
-
Size
568KB
-
MD5
b60b6387fb18df16e563a5e1b374e080
-
SHA1
cf69fdb45dc3ab5958997cc411c664a6f49602c9
-
SHA256
8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c
-
SHA512
1463a88c6b93896666117c6c33124c23a9de5edb68fd60f65db97794b5e08fd6763cf4f5b929ee8dd0cc7f9a1d03e4be08dceeb95fa74ee62b99a6984658685c
-
SSDEEP
12288:XTKfDgWulALVZkES0RgGEVhkyA7F3Xl5MB8vTOvcX6C1dcDbpOZZo+NjrDhWg6jJ:OffuCXpo
Malware Config
Signatures
-
Detects PlugX payload 6 IoCs
resource yara_rule behavioral1/memory/2272-10-0x0000000000170000-0x000000000019E000-memory.dmp family_plugx behavioral1/memory/2272-11-0x0000000000170000-0x000000000019E000-memory.dmp family_plugx behavioral1/memory/2756-25-0x0000000000230000-0x000000000025E000-memory.dmp family_plugx behavioral1/memory/2756-28-0x0000000000230000-0x000000000025E000-memory.dmp family_plugx behavioral1/memory/2756-29-0x0000000000230000-0x000000000025E000-memory.dmp family_plugx behavioral1/memory/2756-30-0x0000000000230000-0x000000000025E000-memory.dmp family_plugx -
Plugx family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ManagerForwarder.lnk 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe -
Executes dropped EXE 1 IoCs
pid Process 2272 MsMpEng.exe -
Loads dropped DLL 3 IoCs
pid Process 1956 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe 2272 MsMpEng.exe 1956 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsMpEng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\MJ iexplore.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\MJ\CLSID = 36003600420033003600430041004300300034003800310038003400420031000000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2556 iexplore.exe 2556 iexplore.exe 2556 iexplore.exe 2556 iexplore.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2556 iexplore.exe 2556 iexplore.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2556 iexplore.exe 2556 iexplore.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2556 iexplore.exe 2556 iexplore.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2556 iexplore.exe 2556 iexplore.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe 2756 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2556 iexplore.exe 2756 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2272 MsMpEng.exe Token: SeTcbPrivilege 2272 MsMpEng.exe Token: SeDebugPrivilege 2556 iexplore.exe Token: SeTcbPrivilege 2556 iexplore.exe Token: SeDebugPrivilege 2756 msiexec.exe Token: SeTcbPrivilege 2756 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1956 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe 1956 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2272 1956 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe 30 PID 1956 wrote to memory of 2272 1956 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe 30 PID 1956 wrote to memory of 2272 1956 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe 30 PID 1956 wrote to memory of 2272 1956 8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe 30 PID 2272 wrote to memory of 2556 2272 MsMpEng.exe 31 PID 2272 wrote to memory of 2556 2272 MsMpEng.exe 31 PID 2272 wrote to memory of 2556 2272 MsMpEng.exe 31 PID 2272 wrote to memory of 2556 2272 MsMpEng.exe 31 PID 2272 wrote to memory of 2556 2272 MsMpEng.exe 31 PID 2272 wrote to memory of 2556 2272 MsMpEng.exe 31 PID 2272 wrote to memory of 2556 2272 MsMpEng.exe 31 PID 2272 wrote to memory of 2556 2272 MsMpEng.exe 31 PID 2272 wrote to memory of 2556 2272 MsMpEng.exe 31 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34 PID 2556 wrote to memory of 2756 2556 iexplore.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe"C:\Users\Admin\AppData\Local\Temp\8fd2ab26d5397dfcef9a48d4106eec604c8e38b86e2ccc148757a157c83f4f8c.exe"1⤵
- Drops startup file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Roaming\6047140391\MsMpEng.exe"C:\Users\Admin\AppData\Roaming\6047140391\MsMpEng.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD57e48f185aee0d846fa27b33c7df6a3de
SHA16bd324c765a3792792366851fcc1f3bb76c61fd6
SHA2563e68697be5f09dbfa32a5b90ef46525e929f8ff94f6074c3bf35707dc9825655
SHA5124438eeaaf42371b1958f99d18d5cf2169b7f39aff6cb136448281e7798f8707fcbc51b68ee01dfaaf03149f52c17d3b7d65d7ae76a4cb00546f47d646e254757
-
Filesize
21KB
MD5b0f49da36f30922f5ddc3b623b778fce
SHA1dfbd5d8df898f4f36eb8f6c420d644df460df098
SHA256ee025aefa4a2095afeabfb3a49639da77d78068a3f5eeda6c15d34853afd5609
SHA5128cedc083f740d609e6e8ad5c5b94c340f38b050c09ee5e9203b2889dd8d9491c72d7279544740fd3d0bd6f76fc71a2785982039032bd0c4f6a0dca55070eb830