Resubmissions

28-01-2022 12:16

220128-pfymdsccbk 10

19-01-2022 09:07

220119-k3bzpagfak 10

Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-01-2022 09:07

General

  • Target

    f373ebb32b2a836b78f932fd436ec49a.exe

  • Size

    492KB

  • MD5

    f373ebb32b2a836b78f932fd436ec49a

  • SHA1

    fdf344a3d5684433e689b61de782d5bd29f185b9

  • SHA256

    47d178214e35dc1d7dca9886abd3fc3e715a934c5e8540e9f0879d5d1c8addee

  • SHA512

    b5fadc8d050d2bae9b1f657f33d8b23d6ac0eb39fb962a64059fe5e39c73a85e5f998a53622e06811616c55d037b115a853794841a2f16354b65af3ca1ffdb48

Malware Config

Extracted

Family

purplefox

Botnet

Sainbox

C2

193.218.38.93

Extracted

Family

purplefox

Signatures

  • Detect PurpleFox Dropper 6 IoCs

    Detect PurpleFox Dropper.

  • Detect PurpleFox Rootkit 6 IoCs

    Detect PurpleFox Rootkit.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • suricata: ET MALWARE OneLouder EXE download possibly installing Zeus P2P

    suricata: ET MALWARE OneLouder EXE download possibly installing Zeus P2P

  • suricata: ET MALWARE Probable OneLouder downloader (Zeus P2P) exe download

    suricata: ET MALWARE Probable OneLouder downloader (Zeus P2P) exe download

  • suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Request M1

    suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Request M1

  • Executes dropped EXE 4 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f373ebb32b2a836b78f932fd436ec49a.exe
    "C:\Users\Admin\AppData\Local\Temp\f373ebb32b2a836b78f932fd436ec49a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Public\Videos\1642583231\7zz.exe
      "C:\Users\Public\Videos\1642583231\7zz.exe" X -ep2 C:\Users\Public\Videos\1642583231\1.rar C:\Users\Public\Videos\1642583231
      2⤵
      • Executes dropped EXE
      PID:2020
    • C:\Users\Public\Videos\1642583231\ojbkcg.exe
      "C:\Users\Public\Videos\1642583231\ojbkcg.exe" -a
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1908
  • C:\Users\Public\Documents\auto\111.exe
    "C:\Users\Public\Documents\auto\111.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\ProgramData\7z.exe
      "C:\ProgramData\7z.exe" x C:\ProgramData\bb.zip -oC:\Users\Admin\AppData\Roaming\Microsoft\Windows
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\222.lnk

    Filesize

    1KB

    MD5

    9ab5c0bbf40b2e1fc5f29a8e474dd215

    SHA1

    1d2716926c3c5086d7d10afdb5964b556e131993

    SHA256

    f169d795ec6f5f75547655c79d359aca5f12834f3d79662865e82af902168f29

    SHA512

    8a596e2aa516d3df834fa79803ace1cb8e2891f3e31876795fa40bda934ff6f97dc5023afcebf9f716c81cce498ce60bf6c1aec2ee079c13d9f534c1fa161f5b

  • C:\ProgramData\7z.dll

    Filesize

    1.1MB

    MD5

    6a9e619a0392bb5918306f7fbaa8c85b

    SHA1

    d18d392e078e703ef7d9ec2a4f2042d7fbbf3863

    SHA256

    3beecf3d764daaffc020ba89dd764b0215fbd360bfc115fbb3880ef0672b98e5

    SHA512

    565c8f27395c41d4778debd0dec63d6fafb703255093d6ad5aea5d8b26f768f8b7ff7b2fa37a710179d3c1c0c0f47075a471c73584eb8941ee38b9ea25dcf809

  • C:\ProgramData\7z.exe

    Filesize

    301KB

    MD5

    c808d5b1f96af6f1869d6b6cdbeffd20

    SHA1

    7818808f9f3f9719420d160f9c842a84eabdf73e

    SHA256

    921226944015f01f2780179690b7bfcee7b92ea452fe85cae9375e49d64ee0b4

    SHA512

    f89a936640d96e92a86fe0c84dbf3273343faf8850e691b750c916afcc4f0ac49ebe985f97279bd8033254c63eff4319721556d04491218448db992823aebe01

  • C:\ProgramData\7z.exe

    Filesize

    301KB

    MD5

    c808d5b1f96af6f1869d6b6cdbeffd20

    SHA1

    7818808f9f3f9719420d160f9c842a84eabdf73e

    SHA256

    921226944015f01f2780179690b7bfcee7b92ea452fe85cae9375e49d64ee0b4

    SHA512

    f89a936640d96e92a86fe0c84dbf3273343faf8850e691b750c916afcc4f0ac49ebe985f97279bd8033254c63eff4319721556d04491218448db992823aebe01

  • C:\ProgramData\bb.zip

    Filesize

    1KB

    MD5

    fd6745c7e6659a134b2388b81f743eb8

    SHA1

    175c4e2e49d86f4a84a5fb675a86460cbdd291c0

    SHA256

    793d02326504985024cd6afa21f0e1555855b59bc3a63442f0c51337ba74720a

    SHA512

    24611c0e585d330ff82561f3586aaa57b07c044dafd1d0513e2257ec53a4eb63a9989be2112e1c0ac5d20e62a2e3ebaa932bfa4c3e5c29d4c8aef68542c3e0f1

  • C:\ProgramData\svchost.txt

    Filesize

    8.5MB

    MD5

    5ecefaea48c5a8498b036acd8ce411a5

    SHA1

    501b3ed0fb6c33f6a122d603292d7fe04e8ce04f

    SHA256

    88dd42dedc77e8ad117cc54d7b37083bbacaa6ecb84553bda31905b0a29e0e4d

    SHA512

    e41a6bb1c734330dac37b9e7552053efdb46d15bf60601613baf8b5ab4be352c4d2f2d1c4e8bc4fe1616b98adfcf7b26336300b3bb724a9016e04d5820b2dd00

  • C:\Users\Public\Documents\auto\111.exe

    Filesize

    328KB

    MD5

    26d1f8cc33a7567463bfaebc2242833c

    SHA1

    1bd4fa5729c289a3ca1c4955f52464e4cc5ec4da

    SHA256

    cb201744a0f50e72ee4fda9298785fa16bfc4bf639a9474457e429278ff376bc

    SHA512

    01b3909272b3b25a9601cef11fd1122660a56b5220e8b3187c1b27135a23cc9aee9926761ce64ca9d8d872719da420131d83d4556c6255d20579be28d274b445

  • C:\Users\Public\Documents\auto\111.exe

    Filesize

    328KB

    MD5

    26d1f8cc33a7567463bfaebc2242833c

    SHA1

    1bd4fa5729c289a3ca1c4955f52464e4cc5ec4da

    SHA256

    cb201744a0f50e72ee4fda9298785fa16bfc4bf639a9474457e429278ff376bc

    SHA512

    01b3909272b3b25a9601cef11fd1122660a56b5220e8b3187c1b27135a23cc9aee9926761ce64ca9d8d872719da420131d83d4556c6255d20579be28d274b445

  • C:\Users\Public\Documents\auto\update.ini

    Filesize

    39B

    MD5

    ee5768d7d9e319e36f17476d12450785

    SHA1

    e08648361310618ea81b793411def40cef9e1745

    SHA256

    e21a77a762b943102a0bd1cd9909b4f2c310889b1e3144a1a1e39fc4f09667bf

    SHA512

    daff15ba6de59d2078dcaee5c381a71c2047bc18782a442c6c9ed83fcea3cb3f00f7a99ddf3092785fd7d7d8b70ee1009a717845074d354ebecac484442dae06

  • C:\Users\Public\Videos\1642583231\1.rar

    Filesize

    2.6MB

    MD5

    ba08eccd1f00c25dfd65f666896893b7

    SHA1

    e5ed83a57d12ba1e4df10483ce41f743807b2b22

    SHA256

    f5806b666f9b416c0f649a53748d79a4e392988c09410689e032eeff71973620

    SHA512

    0b295c2089b966f83cc2f51a599af692f74539f7a1e071113dfd13afd31f9bdd2bc8d2366cfc75c79cd90bc5067638ce48f8f1ff1e47eb6494c528bfef03ffb0

  • C:\Users\Public\Videos\1642583231\360.tct

    Filesize

    254KB

    MD5

    ccdffd31fa73286c21a7bef5fd899f15

    SHA1

    0a1df0830c295ae914fb2094f5eb9a5e8d6746cf

    SHA256

    d70c4f4812884762d0c17060985d38bc24b2a777b7f3148d1bbabdacf4cb4c58

    SHA512

    a865a1eab6b9a7ad8fd2860843536276548cdad3834918772ab5ea4b378ef7c5a8f680671031c9bb6449136da61e683c3f910a241402a4302628b47b91b3e348

  • C:\Users\Public\Videos\1642583231\7zz.exe

    Filesize

    572KB

    MD5

    f2ae502d448cfb81a5f40a9368d99b1a

    SHA1

    f849be86e9e7ced0acd51a68f92992b8090d08a5

    SHA256

    07ad4b984f288304003b080dd013784685181de4353a0b70a0247f96e535bd56

    SHA512

    9f3aea471684e22bf9fc045ca0e47a8429fa0b13c188f9c7a51937efa8afcec976761b0c4c95aed7735096fcc2278bbd86b0ab581261a6aff6c694d7bb65e9be

  • C:\Users\Public\Videos\1642583231\ojbkcg.exe

    Filesize

    329KB

    MD5

    979823a05959fb29275d8f2537886924

    SHA1

    36d58a7ca54ec317879cd2df0a1e6a640c987cc9

    SHA256

    bc7efcee6c968970fc88d1fecfd855c7a70f29144024004099111ed1de7c7282

    SHA512

    c2a54714d861283eda9693f8ca92f36cf6dd216168fdcf724771060337d807eff5383ac5f655ba65a03922ef929c6b0866a514e5228198e2fc5e7f47bac683b0

  • C:\Users\Public\Videos\1642583231\ojbkcg.exe

    Filesize

    329KB

    MD5

    979823a05959fb29275d8f2537886924

    SHA1

    36d58a7ca54ec317879cd2df0a1e6a640c987cc9

    SHA256

    bc7efcee6c968970fc88d1fecfd855c7a70f29144024004099111ed1de7c7282

    SHA512

    c2a54714d861283eda9693f8ca92f36cf6dd216168fdcf724771060337d807eff5383ac5f655ba65a03922ef929c6b0866a514e5228198e2fc5e7f47bac683b0

  • C:\Users\Public\Videos\1642583231\rundll3222.exe

    Filesize

    45KB

    MD5

    c36bb659f08f046b139c8d1b980bf1ac

    SHA1

    dd3247b225a8da3161f76055f31cbc5f64a66086

    SHA256

    405f03534be8b45185695f68deb47d4daf04dcd6df9d351ca6831d3721b1efc4

    SHA512

    3eeae6a3b424fa1709b4443f625ee99fa2d2861661214b868d36bf5a63c0aaac61ad3bdd9c4b18cb9d820ef89653787df812289d31d65415c4dd08fd45d0c73f

  • C:\Users\Public\Videos\1642583231\svchost.txt

    Filesize

    8.5MB

    MD5

    5ecefaea48c5a8498b036acd8ce411a5

    SHA1

    501b3ed0fb6c33f6a122d603292d7fe04e8ce04f

    SHA256

    88dd42dedc77e8ad117cc54d7b37083bbacaa6ecb84553bda31905b0a29e0e4d

    SHA512

    e41a6bb1c734330dac37b9e7552053efdb46d15bf60601613baf8b5ab4be352c4d2f2d1c4e8bc4fe1616b98adfcf7b26336300b3bb724a9016e04d5820b2dd00

  • \ProgramData\7z.dll

    Filesize

    1.1MB

    MD5

    6a9e619a0392bb5918306f7fbaa8c85b

    SHA1

    d18d392e078e703ef7d9ec2a4f2042d7fbbf3863

    SHA256

    3beecf3d764daaffc020ba89dd764b0215fbd360bfc115fbb3880ef0672b98e5

    SHA512

    565c8f27395c41d4778debd0dec63d6fafb703255093d6ad5aea5d8b26f768f8b7ff7b2fa37a710179d3c1c0c0f47075a471c73584eb8941ee38b9ea25dcf809

  • \ProgramData\7z.exe

    Filesize

    301KB

    MD5

    c808d5b1f96af6f1869d6b6cdbeffd20

    SHA1

    7818808f9f3f9719420d160f9c842a84eabdf73e

    SHA256

    921226944015f01f2780179690b7bfcee7b92ea452fe85cae9375e49d64ee0b4

    SHA512

    f89a936640d96e92a86fe0c84dbf3273343faf8850e691b750c916afcc4f0ac49ebe985f97279bd8033254c63eff4319721556d04491218448db992823aebe01

  • \ProgramData\7z.exe

    Filesize

    301KB

    MD5

    c808d5b1f96af6f1869d6b6cdbeffd20

    SHA1

    7818808f9f3f9719420d160f9c842a84eabdf73e

    SHA256

    921226944015f01f2780179690b7bfcee7b92ea452fe85cae9375e49d64ee0b4

    SHA512

    f89a936640d96e92a86fe0c84dbf3273343faf8850e691b750c916afcc4f0ac49ebe985f97279bd8033254c63eff4319721556d04491218448db992823aebe01

  • \ProgramData\7z.exe

    Filesize

    301KB

    MD5

    c808d5b1f96af6f1869d6b6cdbeffd20

    SHA1

    7818808f9f3f9719420d160f9c842a84eabdf73e

    SHA256

    921226944015f01f2780179690b7bfcee7b92ea452fe85cae9375e49d64ee0b4

    SHA512

    f89a936640d96e92a86fe0c84dbf3273343faf8850e691b750c916afcc4f0ac49ebe985f97279bd8033254c63eff4319721556d04491218448db992823aebe01

  • \ProgramData\7z.exe

    Filesize

    301KB

    MD5

    c808d5b1f96af6f1869d6b6cdbeffd20

    SHA1

    7818808f9f3f9719420d160f9c842a84eabdf73e

    SHA256

    921226944015f01f2780179690b7bfcee7b92ea452fe85cae9375e49d64ee0b4

    SHA512

    f89a936640d96e92a86fe0c84dbf3273343faf8850e691b750c916afcc4f0ac49ebe985f97279bd8033254c63eff4319721556d04491218448db992823aebe01

  • \Users\Public\Videos\1642583231\360.tct

    Filesize

    254KB

    MD5

    ccdffd31fa73286c21a7bef5fd899f15

    SHA1

    0a1df0830c295ae914fb2094f5eb9a5e8d6746cf

    SHA256

    d70c4f4812884762d0c17060985d38bc24b2a777b7f3148d1bbabdacf4cb4c58

    SHA512

    a865a1eab6b9a7ad8fd2860843536276548cdad3834918772ab5ea4b378ef7c5a8f680671031c9bb6449136da61e683c3f910a241402a4302628b47b91b3e348

  • \Users\Public\Videos\1642583231\7zz.exe

    Filesize

    572KB

    MD5

    f2ae502d448cfb81a5f40a9368d99b1a

    SHA1

    f849be86e9e7ced0acd51a68f92992b8090d08a5

    SHA256

    07ad4b984f288304003b080dd013784685181de4353a0b70a0247f96e535bd56

    SHA512

    9f3aea471684e22bf9fc045ca0e47a8429fa0b13c188f9c7a51937efa8afcec976761b0c4c95aed7735096fcc2278bbd86b0ab581261a6aff6c694d7bb65e9be

  • \Users\Public\Videos\1642583231\ojbkcg.exe

    Filesize

    329KB

    MD5

    979823a05959fb29275d8f2537886924

    SHA1

    36d58a7ca54ec317879cd2df0a1e6a640c987cc9

    SHA256

    bc7efcee6c968970fc88d1fecfd855c7a70f29144024004099111ed1de7c7282

    SHA512

    c2a54714d861283eda9693f8ca92f36cf6dd216168fdcf724771060337d807eff5383ac5f655ba65a03922ef929c6b0866a514e5228198e2fc5e7f47bac683b0

  • memory/1600-54-0x0000000075601000-0x0000000075603000-memory.dmp

    Filesize

    8KB

  • memory/1908-73-0x000007FEFB771000-0x000007FEFB773000-memory.dmp

    Filesize

    8KB

  • memory/1908-70-0x0000000001F30000-0x00000000027A5000-memory.dmp

    Filesize

    8.5MB

  • memory/1908-67-0x0000000180000000-0x00000001808AB000-memory.dmp

    Filesize

    8.7MB