Analysis

  • max time kernel
    116s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2022 08:09

General

  • Target

    02a911e02491280762744c40977ee02bcde2df77acb2311367d4e3340a168d9f.exe

  • Size

    899KB

  • MD5

    77e815f082224c57b60824e4a0e1bd84

  • SHA1

    275ea889ecde5dddd92565b8c2e95eef639b55e8

  • SHA256

    02a911e02491280762744c40977ee02bcde2df77acb2311367d4e3340a168d9f

  • SHA512

    ebd530738031f6391424609293d485ae54aab0f10c4ff4a8c93667581c7caabd5c40d38f24253eb8a9e0e3a8bba07a4b3edf9aa1e3313f15583628e05595e1fe

Malware Config

Signatures

  • Detect PurpleFox Dropper 1 IoCs

    Detect PurpleFox Dropper.

  • Detect PurpleFox Rootkit 1 IoCs

    Detect PurpleFox Rootkit.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Downloads MZ/PE file
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\02a911e02491280762744c40977ee02bcde2df77acb2311367d4e3340a168d9f.exe
    "C:\Users\Admin\AppData\Local\Temp\02a911e02491280762744c40977ee02bcde2df77acb2311367d4e3340a168d9f.exe"
    1⤵
      PID:4952

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads