| File name: | 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66 |
| Full analysis: | https://app.any.run/tasks/a57fba11-ad2b-4a6c-ad79-f15f474e0fdb |
| Verdict: | Malicious activity |
| Threats: | PlugX is a remote access trojan that is used extensively by Chinese APTs. The malware is primarily employed for spying on victims and can perform a variety of malicious activities, such as logging users’ keystrokes and exfiltrating information from browsers. |
| Analysis date: | April 12, 2021, 13:53:19 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | D4BBE83CC2D148175032E57A362D2F38 |
| SHA1: | B6984512D630C45C759E84074C6A0670BC7824CB |
| SHA256: | 75AD7745E2B81CB5FFC6D1E267B6C06F56F260452EDF09EF4D6FD3ECAD584E66 |
| SSDEEP: | 12288:nhxp3lZnT9bDuaI3yzO2dXPGSg9raq063Zd7:nJlh9bDuaIizhYwqB3Zd7 |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| Subsystem: | Windows GUI |
|---|---|
| SubsystemVersion: | 5.1 |
| ImageVersion: | - |
| OSVersion: | 5.1 |
| EntryPoint: | 0x1cab5 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 196096 |
| CodeSize: | 188416 |
| LinkerVersion: | 14 |
| PEType: | PE32 |
| TimeStamp: | 2016:08:14 21:15:49+02:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 14-Aug-2016 19:15:49 |
| Detected languages: |
|
| Debug artifacts: |
|
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000108 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 6 |
| Time date stamp: | 14-Aug-2016 19:15:49 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0002DFE8 | 0x0002E000 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.71025 |
.rdata | 0x0002F000 | 0x000099D0 | 0x00009A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.15287 |
.data | 0x00039000 | 0x0001F8B8 | 0x00000C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 3.29547 |
.gfids | 0x00059000 | 0x000000F0 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 2.12367 |
.rsrc | 0x0005A000 | 0x00004680 | 0x00004800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.63811 |
.reloc | 0x0005F000 | 0x00001F8C | 0x00002000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.62986 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.25329 | 1875 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 3.88998 | 1384 | UNKNOWN | English - United States | RT_ICON |
3 | 4.12176 | 744 | UNKNOWN | English - United States | RT_ICON |
4 | 4.68705 | 2216 | UNKNOWN | English - United States | RT_ICON |
7 | 3.1586 | 482 | UNKNOWN | English - United States | RT_STRING |
8 | 3.11685 | 460 | UNKNOWN | English - United States | RT_STRING |
9 | 3.15447 | 494 | UNKNOWN | English - United States | RT_STRING |
10 | 2.99727 | 326 | UNKNOWN | English - United States | RT_STRING |
11 | 3.2036 | 1094 | UNKNOWN | English - United States | RT_STRING |
12 | 3.12889 | 358 | UNKNOWN | English - United States | RT_STRING |
COMCTL32.dll (delay-loaded) |
KERNEL32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 308 | "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "ZBT_0.1" /f | C:\Windows\System32\cmd.exe | — | Smadav.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 996 | SCHTASKS.exe /delete /tn "AcroRd32" /f | C:\Windows\system32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1000 | SCHTASKS.exe /delete /tn "udisk_1" /f | C:\Windows\system32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1292 | "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "AcroRd32" /f | C:\Windows\System32\cmd.exe | — | Smadav.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1328 | "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "ZBT_0.1" /f | C:\Windows\System32\cmd.exe | — | Smadav.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1720 | "C:\Windows\System32\cmd.exe" /c SCHTASKS.exe /delete /tn "AcroRd32" /f | C:\Windows\System32\cmd.exe | — | Smadav.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1732 | "C:\Users\admin\AppData\Local\Temp\75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe" | C:\Users\admin\AppData\Local\Temp\75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1744 | C:\ProgramData\Smadav\SmadavIUe\Smadav.exe 488 | C:\ProgramData\Smadav\SmadavIUe\Smadav.exe | Smadav.exe | ||||||||||||
User: admin Company: Smadav Software Integrity Level: MEDIUM Description: Smadav Whitelisting Protection Exit code: 0 Version: 1, 0, 0, 3 Modules
| |||||||||||||||
| 1752 | SCHTASKS.exe /delete /tn "ZBT_0.1" /f | C:\Windows\system32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1912 | SCHTASKS.exe /delete /tn "LKUFORYOU_1" /f | C:\Windows\system32\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (1732) 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (1732) 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (1732) 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1732) 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1732) 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2960) Smadav.exe | Key: | HKEY_CLASSES_ROOT\ms-pu |
| Operation: | write | Name: | CLSID |
Value: 33003000310031003100320034003500320034003100450045004400450031000000 | |||
| (PID) Process: | (2960) Smadav.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | SmadavIUe |
Value: "C:\ProgramData\Smadav\SmadavIUe\Smadav.exe" 488 | |||
| (PID) Process: | (1744) Smadav.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (1744) Smadav.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (1744) Smadav.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1732 | 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe | C:\Users\admin\AppData\Local\Temp\SmadHook32c.dll | executable | |
MD5:FC55344597D540453326D94EB673E750 | SHA256:3A53BD36B24BC40BDCE289D26F1B6965C0A5E71F26B05D19C7AA73D9E3CFA6FF | |||
| 2960 | Smadav.exe | C:\ProgramData\Smadav\SmadavIUe\smadavupdate.dat | binary | |
MD5:504A73639A7868ED8576EA3CBAFC0239 | SHA256:2304891F176A92C62F43D9FD30CAE943F1521394DCE792C6DE0E097D10103D45 | |||
| 1732 | 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe | C:\Users\admin\AppData\Local\Temp\smadavupdate.dat | binary | |
MD5:504A73639A7868ED8576EA3CBAFC0239 | SHA256:2304891F176A92C62F43D9FD30CAE943F1521394DCE792C6DE0E097D10103D45 | |||
| 1732 | 75ad7745e2b81cb5ffc6d1e267b6c06f56f260452edf09ef4d6fd3ecad584e66.exe | C:\Users\admin\AppData\Local\Temp\Smadav.exe | executable | |
MD5:155DE7D464125B8C35B22DAE37428ABA | SHA256:4F54A6555A7A3BEC84E8193D2FF9AE75EB7F06110505E78337FA2F515790A562 | |||
| 2960 | Smadav.exe | C:\ProgramData\Smadav\SmadavIUe\Smadav.exe | executable | |
MD5:155DE7D464125B8C35B22DAE37428ABA | SHA256:4F54A6555A7A3BEC84E8193D2FF9AE75EB7F06110505E78337FA2F515790A562 | |||
| 2960 | Smadav.exe | C:\ProgramData\Smadav\SmadavIUe\SmadHook32c.dll | executable | |
MD5:FC55344597D540453326D94EB673E750 | SHA256:3A53BD36B24BC40BDCE289D26F1B6965C0A5E71F26B05D19C7AA73D9E3CFA6FF | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1744 | Smadav.exe | POST | — | 43.254.217.165:80 | http://43.254.217.165/161005ca | HK | — | — | malicious |
1744 | Smadav.exe | POST | — | 43.254.217.165:80 | http://43.254.217.165/41fa2c35 | HK | — | — | malicious |
1744 | Smadav.exe | POST | — | 43.254.217.165:80 | http://43.254.217.165/abd207f2 | HK | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1744 | Smadav.exe | 43.254.217.165:80 | — | Cloudie Limited | HK | malicious |
1744 | Smadav.exe | 104.79.89.142:443 | www.microsoft.com | Time Warner Cable Internet LLC | US | unknown |
1744 | Smadav.exe | 43.254.217.165:110 | — | Cloudie Limited | HK | malicious |
Domain | IP | Reputation |
|---|---|---|
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1744 | Smadav.exe | A Network Trojan was detected | ET TROJAN Possible PlugX Common Header Struct |
1744 | Smadav.exe | A Network Trojan was detected | AV TROJAN PlugX Common Header Struct |