Analysis
-
max time kernel
123s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
22-01-2022 08:05
Behavioral task
behavioral1
Sample
3ec149660a6808f711ca6cb6b20c1dda.exe
Resource
win7-en-20211208
General
-
Target
3ec149660a6808f711ca6cb6b20c1dda.exe
-
Size
658KB
-
MD5
3ec149660a6808f711ca6cb6b20c1dda
-
SHA1
45c3d1d8dd512c01fd6c897c67b35c13c49828cb
-
SHA256
2d288f2cd6752a01360f2669959e2c61f676f8156d5cc40d4b415245ae04cf6d
-
SHA512
3a15e7bfbabeb296001086453320a133dc242ef170ccf45d459d2a7f402fadfe3329099d79b368416d565ba0c16eb051b64fe7b756c21f822ab49ec483b5649d
Malware Config
Extracted
purplefox
Sainbox
193.218.38.93
Extracted
purplefox
Signatures
-
Processes:
yara_rule purplefox_dropper C:\Users\Public\Videos\1639137659\svchost.txt purplefox_dropper C:\ProgramData\svchost.txt purplefox_dropper behavioral2/memory/728-188-0x0000000180000000-0x00000001808AB000-memory.dmp purplefox_dropper behavioral2/memory/728-193-0x00000228A3650000-0x00000228A3EC5000-memory.dmp purplefox_dropper -
Processes:
yara_rule purplefox_rootkit purplefox_rootkit C:\Users\Public\Videos\1639137659\svchost.txt purplefox_rootkit C:\ProgramData\svchost.txt purplefox_rootkit behavioral2/memory/728-188-0x0000000180000000-0x00000001808AB000-memory.dmp purplefox_rootkit behavioral2/memory/728-193-0x00000228A3650000-0x00000228A3EC5000-memory.dmp purplefox_rootkit -
suricata: ET MALWARE OneLouder EXE download possibly installing Zeus P2P
suricata: ET MALWARE OneLouder EXE download possibly installing Zeus P2P
-
suricata: ET MALWARE Probable OneLouder downloader (Zeus P2P) exe download
suricata: ET MALWARE Probable OneLouder downloader (Zeus P2P) exe download
-
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Request M1
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Request M1
-
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Server Response M1
suricata: ET MALWARE PurpleFox Backdoor/Rootkit Download Server Response M1
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
7zz.exeojbkcg.exe111.exe7z.exepid process 3676 7zz.exe 728 ojbkcg.exe 1672 111.exe 1852 7z.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
111.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\International\Geo\Nation 111.exe -
Drops startup file 2 IoCs
Processes:
7z.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\╧╘┐¿╟²╢».lnk 7z.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\╧╘┐¿╟²╢».lnk 7z.exe -
Loads dropped DLL 2 IoCs
Processes:
ojbkcg.exe7z.exepid process 728 ojbkcg.exe 1852 7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
ojbkcg.exe111.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings ojbkcg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance 111.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3ec149660a6808f711ca6cb6b20c1dda.exepid process 4084 3ec149660a6808f711ca6cb6b20c1dda.exe 4084 3ec149660a6808f711ca6cb6b20c1dda.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7z.exedescription pid process Token: SeRestorePrivilege 1852 7z.exe Token: 35 1852 7z.exe Token: SeSecurityPrivilege 1852 7z.exe Token: SeSecurityPrivilege 1852 7z.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
111.exepid process 1672 111.exe 1672 111.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3ec149660a6808f711ca6cb6b20c1dda.exe111.exedescription pid process target process PID 4084 wrote to memory of 3676 4084 3ec149660a6808f711ca6cb6b20c1dda.exe 7zz.exe PID 4084 wrote to memory of 3676 4084 3ec149660a6808f711ca6cb6b20c1dda.exe 7zz.exe PID 4084 wrote to memory of 3676 4084 3ec149660a6808f711ca6cb6b20c1dda.exe 7zz.exe PID 4084 wrote to memory of 728 4084 3ec149660a6808f711ca6cb6b20c1dda.exe ojbkcg.exe PID 4084 wrote to memory of 728 4084 3ec149660a6808f711ca6cb6b20c1dda.exe ojbkcg.exe PID 1672 wrote to memory of 1852 1672 111.exe 7z.exe PID 1672 wrote to memory of 1852 1672 111.exe 7z.exe PID 1672 wrote to memory of 1852 1672 111.exe 7z.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ec149660a6808f711ca6cb6b20c1dda.exe"C:\Users\Admin\AppData\Local\Temp\3ec149660a6808f711ca6cb6b20c1dda.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Public\Videos\1639137659\7zz.exe"C:\Users\Public\Videos\1639137659\7zz.exe" X -ep2 C:\Users\Public\Videos\1639137659\1.rar C:\Users\Public\Videos\16391376592⤵
- Executes dropped EXE
PID:3676
-
-
C:\Users\Public\Videos\1639137659\ojbkcg.exe"C:\Users\Public\Videos\1639137659\ojbkcg.exe" -a2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:728
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2340
-
C:\Users\Public\Documents\auto\111.exe"C:\Users\Public\Documents\auto\111.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\ProgramData\7z.exe"C:\ProgramData\7z.exe" x C:\ProgramData\bb.zip -oC:\Users\Admin\AppData\Roaming\Microsoft\Windows2⤵
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59ab5c0bbf40b2e1fc5f29a8e474dd215
SHA11d2716926c3c5086d7d10afdb5964b556e131993
SHA256f169d795ec6f5f75547655c79d359aca5f12834f3d79662865e82af902168f29
SHA5128a596e2aa516d3df834fa79803ace1cb8e2891f3e31876795fa40bda934ff6f97dc5023afcebf9f716c81cce498ce60bf6c1aec2ee079c13d9f534c1fa161f5b
-
Filesize
1.1MB
MD56a9e619a0392bb5918306f7fbaa8c85b
SHA1d18d392e078e703ef7d9ec2a4f2042d7fbbf3863
SHA2563beecf3d764daaffc020ba89dd764b0215fbd360bfc115fbb3880ef0672b98e5
SHA512565c8f27395c41d4778debd0dec63d6fafb703255093d6ad5aea5d8b26f768f8b7ff7b2fa37a710179d3c1c0c0f47075a471c73584eb8941ee38b9ea25dcf809
-
Filesize
301KB
MD5c808d5b1f96af6f1869d6b6cdbeffd20
SHA17818808f9f3f9719420d160f9c842a84eabdf73e
SHA256921226944015f01f2780179690b7bfcee7b92ea452fe85cae9375e49d64ee0b4
SHA512f89a936640d96e92a86fe0c84dbf3273343faf8850e691b750c916afcc4f0ac49ebe985f97279bd8033254c63eff4319721556d04491218448db992823aebe01
-
Filesize
301KB
MD5c808d5b1f96af6f1869d6b6cdbeffd20
SHA17818808f9f3f9719420d160f9c842a84eabdf73e
SHA256921226944015f01f2780179690b7bfcee7b92ea452fe85cae9375e49d64ee0b4
SHA512f89a936640d96e92a86fe0c84dbf3273343faf8850e691b750c916afcc4f0ac49ebe985f97279bd8033254c63eff4319721556d04491218448db992823aebe01
-
Filesize
1KB
MD5fd6745c7e6659a134b2388b81f743eb8
SHA1175c4e2e49d86f4a84a5fb675a86460cbdd291c0
SHA256793d02326504985024cd6afa21f0e1555855b59bc3a63442f0c51337ba74720a
SHA51224611c0e585d330ff82561f3586aaa57b07c044dafd1d0513e2257ec53a4eb63a9989be2112e1c0ac5d20e62a2e3ebaa932bfa4c3e5c29d4c8aef68542c3e0f1
-
Filesize
8.5MB
MD55ecefaea48c5a8498b036acd8ce411a5
SHA1501b3ed0fb6c33f6a122d603292d7fe04e8ce04f
SHA25688dd42dedc77e8ad117cc54d7b37083bbacaa6ecb84553bda31905b0a29e0e4d
SHA512e41a6bb1c734330dac37b9e7552053efdb46d15bf60601613baf8b5ab4be352c4d2f2d1c4e8bc4fe1616b98adfcf7b26336300b3bb724a9016e04d5820b2dd00
-
Filesize
328KB
MD526d1f8cc33a7567463bfaebc2242833c
SHA11bd4fa5729c289a3ca1c4955f52464e4cc5ec4da
SHA256cb201744a0f50e72ee4fda9298785fa16bfc4bf639a9474457e429278ff376bc
SHA51201b3909272b3b25a9601cef11fd1122660a56b5220e8b3187c1b27135a23cc9aee9926761ce64ca9d8d872719da420131d83d4556c6255d20579be28d274b445
-
Filesize
328KB
MD526d1f8cc33a7567463bfaebc2242833c
SHA11bd4fa5729c289a3ca1c4955f52464e4cc5ec4da
SHA256cb201744a0f50e72ee4fda9298785fa16bfc4bf639a9474457e429278ff376bc
SHA51201b3909272b3b25a9601cef11fd1122660a56b5220e8b3187c1b27135a23cc9aee9926761ce64ca9d8d872719da420131d83d4556c6255d20579be28d274b445
-
Filesize
39B
MD5ee5768d7d9e319e36f17476d12450785
SHA1e08648361310618ea81b793411def40cef9e1745
SHA256e21a77a762b943102a0bd1cd9909b4f2c310889b1e3144a1a1e39fc4f09667bf
SHA512daff15ba6de59d2078dcaee5c381a71c2047bc18782a442c6c9ed83fcea3cb3f00f7a99ddf3092785fd7d7d8b70ee1009a717845074d354ebecac484442dae06
-
Filesize
2.5MB
MD5d128554d9d70875725ad776d68de9d28
SHA11396e4eda078c8c6cb980d8508afe109537b09f0
SHA256a4ff67d7b4cf8d8b653c5880a3eede800e1d8b446817ca46b765fc721500803f
SHA51220fb0f33a753b2cf6f410a0dc3a4d5846c694bc8074836caae948ebec5671e71ed4e556847f635bfd9fa18300874f69947c2999a7cf523e5936a2906535c38b0
-
Filesize
254KB
MD50d63452f6767d54ce5ee73f9cb1083c9
SHA1484236ec2cb5eb1784fc05f9cd3f68d1e9b0a7e9
SHA25657119d54b90eebd73bc62006e094f1961fb5a2f78ec63ae3bd00dfdbca5d995f
SHA5128d0d22e7f7b2732c2247036a53d28a63468e9e339419cc196536d9d415acfa3c145d9483536e59fa2cbcdb36af93f65aa033f9c774f1d3cf50afc0025a00a2e5
-
Filesize
572KB
MD5f2ae502d448cfb81a5f40a9368d99b1a
SHA1f849be86e9e7ced0acd51a68f92992b8090d08a5
SHA25607ad4b984f288304003b080dd013784685181de4353a0b70a0247f96e535bd56
SHA5129f3aea471684e22bf9fc045ca0e47a8429fa0b13c188f9c7a51937efa8afcec976761b0c4c95aed7735096fcc2278bbd86b0ab581261a6aff6c694d7bb65e9be
-
Filesize
95KB
MD5e9e913a0fa0eb4365bb415a5cf5b804a
SHA184f0f152dd2937c99fddc37ac54c245a4777b964
SHA2564a54964ba3294d426cd78f82be0e2cf57fbeff0686ab85c47eb49a3d0837dcee
SHA51260458398dbc293baffb34d866e185fb3a7950304f6fb155969a0f05d8510a4c078b150f72b172a6b303278e54400f2d30e28697319ab72c5f8782cde5083e297
-
Filesize
95KB
MD5e9e913a0fa0eb4365bb415a5cf5b804a
SHA184f0f152dd2937c99fddc37ac54c245a4777b964
SHA2564a54964ba3294d426cd78f82be0e2cf57fbeff0686ab85c47eb49a3d0837dcee
SHA51260458398dbc293baffb34d866e185fb3a7950304f6fb155969a0f05d8510a4c078b150f72b172a6b303278e54400f2d30e28697319ab72c5f8782cde5083e297
-
Filesize
45KB
MD5c36bb659f08f046b139c8d1b980bf1ac
SHA1dd3247b225a8da3161f76055f31cbc5f64a66086
SHA256405f03534be8b45185695f68deb47d4daf04dcd6df9d351ca6831d3721b1efc4
SHA5123eeae6a3b424fa1709b4443f625ee99fa2d2861661214b868d36bf5a63c0aaac61ad3bdd9c4b18cb9d820ef89653787df812289d31d65415c4dd08fd45d0c73f
-
Filesize
8.5MB
MD55ecefaea48c5a8498b036acd8ce411a5
SHA1501b3ed0fb6c33f6a122d603292d7fe04e8ce04f
SHA25688dd42dedc77e8ad117cc54d7b37083bbacaa6ecb84553bda31905b0a29e0e4d
SHA512e41a6bb1c734330dac37b9e7552053efdb46d15bf60601613baf8b5ab4be352c4d2f2d1c4e8bc4fe1616b98adfcf7b26336300b3bb724a9016e04d5820b2dd00
-
Filesize
1.1MB
MD56a9e619a0392bb5918306f7fbaa8c85b
SHA1d18d392e078e703ef7d9ec2a4f2042d7fbbf3863
SHA2563beecf3d764daaffc020ba89dd764b0215fbd360bfc115fbb3880ef0672b98e5
SHA512565c8f27395c41d4778debd0dec63d6fafb703255093d6ad5aea5d8b26f768f8b7ff7b2fa37a710179d3c1c0c0f47075a471c73584eb8941ee38b9ea25dcf809
-
Filesize
254KB
MD50d63452f6767d54ce5ee73f9cb1083c9
SHA1484236ec2cb5eb1784fc05f9cd3f68d1e9b0a7e9
SHA25657119d54b90eebd73bc62006e094f1961fb5a2f78ec63ae3bd00dfdbca5d995f
SHA5128d0d22e7f7b2732c2247036a53d28a63468e9e339419cc196536d9d415acfa3c145d9483536e59fa2cbcdb36af93f65aa033f9c774f1d3cf50afc0025a00a2e5