Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2022 21:39
Static task
static1
Behavioral task
behavioral1
Sample
3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe
Resource
win7-20220901-en
General
-
Target
3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe
-
Size
416KB
-
MD5
dfc7f23c614f09dbd3c51b91177ec88b
-
SHA1
0d3b03a486fa37e0fddd7e59c5a329869c663633
-
SHA256
3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95
-
SHA512
25e3d55463d672c18856598c9735e6d6b22152c2123769e1ebc8d13a6acc5843ff745ec1815d9f982b0b75f3036044baac326c8552a9a946eb787b3c4d8e3a7d
-
SSDEEP
6144:REg2/FmkfKc+Mz6aEctnbbWj/VI1N5kvsWT6kRXAfAarxGEEXXUOCwKHmp4N9:OtUsz6aEcV6rVI/HWTxRXAoi647
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4324-132-0x0000000002F50000-0x00000000030F6000-memory.dmp purplefox_rootkit behavioral2/memory/4324-133-0x0000000002E10000-0x0000000002F49000-memory.dmp purplefox_rootkit behavioral2/memory/4324-134-0x0000000002F50000-0x00000000030F6000-memory.dmp purplefox_rootkit behavioral2/memory/2492-145-0x00000000025B0000-0x0000000002756000-memory.dmp purplefox_rootkit behavioral2/memory/4324-146-0x0000000002F50000-0x00000000030F6000-memory.dmp purplefox_rootkit behavioral2/memory/2492-150-0x00000000025B0000-0x0000000002756000-memory.dmp purplefox_rootkit behavioral2/memory/2492-153-0x00000000025B0000-0x0000000002756000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/4324-132-0x0000000002F50000-0x00000000030F6000-memory.dmp family_gh0strat behavioral2/memory/4324-133-0x0000000002E10000-0x0000000002F49000-memory.dmp family_gh0strat behavioral2/memory/4324-134-0x0000000002F50000-0x00000000030F6000-memory.dmp family_gh0strat behavioral2/memory/2492-145-0x00000000025B0000-0x0000000002756000-memory.dmp family_gh0strat behavioral2/memory/4324-146-0x0000000002F50000-0x00000000030F6000-memory.dmp family_gh0strat behavioral2/memory/2492-150-0x00000000025B0000-0x0000000002756000-memory.dmp family_gh0strat behavioral2/memory/2492-153-0x00000000025B0000-0x0000000002756000-memory.dmp family_gh0strat -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
windows.exepid process 2492 windows.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 4552 attrib.exe 2856 attrib.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exewindows.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation windows.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
windows.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Window°²È«·À»¤ÖÐÐÄÄ£¿é = "C:\\ProgramData\\Micros\\svchost.exe" windows.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windows.exedescription ioc process File opened (read-only) \??\B: windows.exe File opened (read-only) \??\H: windows.exe File opened (read-only) \??\I: windows.exe File opened (read-only) \??\Q: windows.exe File opened (read-only) \??\R: windows.exe File opened (read-only) \??\U: windows.exe File opened (read-only) \??\K: windows.exe File opened (read-only) \??\L: windows.exe File opened (read-only) \??\P: windows.exe File opened (read-only) \??\Y: windows.exe File opened (read-only) \??\F: windows.exe File opened (read-only) \??\G: windows.exe File opened (read-only) \??\O: windows.exe File opened (read-only) \??\T: windows.exe File opened (read-only) \??\V: windows.exe File opened (read-only) \??\W: windows.exe File opened (read-only) \??\X: windows.exe File opened (read-only) \??\Z: windows.exe File opened (read-only) \??\E: windows.exe File opened (read-only) \??\J: windows.exe File opened (read-only) \??\M: windows.exe File opened (read-only) \??\N: windows.exe File opened (read-only) \??\S: windows.exe -
Drops file in Program Files directory 1 IoCs
Processes:
attrib.exedescription ioc process File opened for modification C:\PROGRA~3\windows.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
windows.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 windows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz windows.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exewindows.exepid process 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe 2492 windows.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exewindows.exedescription pid process Token: SeIncBasePriorityPrivilege 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe Token: SeIncBasePriorityPrivilege 2492 windows.exe Token: 33 2492 windows.exe Token: SeIncBasePriorityPrivilege 2492 windows.exe Token: 33 2492 windows.exe Token: SeIncBasePriorityPrivilege 2492 windows.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exewindows.exepid process 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe 2492 windows.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.execmd.exewindows.execmd.exedescription pid process target process PID 4324 wrote to memory of 5036 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 5036 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 5036 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 4932 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 4932 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 4932 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 4280 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 4280 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 4280 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 460 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 460 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 4324 wrote to memory of 460 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe cmd.exe PID 5036 wrote to memory of 4552 5036 cmd.exe attrib.exe PID 5036 wrote to memory of 4552 5036 cmd.exe attrib.exe PID 5036 wrote to memory of 4552 5036 cmd.exe attrib.exe PID 4324 wrote to memory of 2492 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe windows.exe PID 4324 wrote to memory of 2492 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe windows.exe PID 4324 wrote to memory of 2492 4324 3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe windows.exe PID 2492 wrote to memory of 2004 2492 windows.exe cmd.exe PID 2492 wrote to memory of 2004 2492 windows.exe cmd.exe PID 2492 wrote to memory of 2004 2492 windows.exe cmd.exe PID 2004 wrote to memory of 2856 2004 cmd.exe attrib.exe PID 2004 wrote to memory of 2856 2004 cmd.exe attrib.exe PID 2004 wrote to memory of 2856 2004 cmd.exe attrib.exe PID 2492 wrote to memory of 3996 2492 windows.exe cmd.exe PID 2492 wrote to memory of 3996 2492 windows.exe cmd.exe PID 2492 wrote to memory of 3996 2492 windows.exe cmd.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 4552 attrib.exe 2856 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe"C:\Users\Admin\AppData\Local\Temp\3783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib C:\Users\Admin\AppData\Local\Temp\3783F3~1.EXE +s +h2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib C:\Users\Admin\AppData\Local\Temp\3783F3~1.EXE +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.execmd /c md C:\ProgramData\Micros2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c md C:\ProgramData\Micros2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c md C:\ProgramData\Micros2⤵
-
C:\ProgramData\windows.exeC:\ProgramData\windows.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib C:\PROGRA~3\windows.exe +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib C:\PROGRA~3\windows.exe +s +h4⤵
- Sets file to hidden
- Drops file in Program Files directory
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.execmd /c md C:\ProgramData\ru3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Micros\1.txtFilesize
76KB
MD5a0174e9945895fa8ace11f6bb4a64298
SHA1527c4ebc005deb88f29edd83a23ac977735d76c4
SHA2562dcd521895377ae3463dd61369c7fc6aafd8610e020592bf29b88888fc295ca0
SHA512974f26161cc94c42fbe781db476562ccee90051f5c419ad156d4d17ab63231fa62a064c32cf1acc648e06d01d7f69e785f1421407859f2d78976d76a89b27dec
-
C:\ProgramData\Micros\2.txtFilesize
44KB
MD596d097045736a2a1526d63c2d83a6b22
SHA1dde933d7fcc22e41f981d043a3aa835e3b19f86e
SHA256abbd451b402243bf00ad76f253d2b1c3f80d1d6f6c7f5b2f0d5e3fdd7f9c06e5
SHA512e6ef5a7f25af760fef212b46b1796b8b386575e258a8b02a4c74510bb600e7fac3d344cceae14ef4b72a2520022e7cc611b34a56f737892ed4970ed1150945bd
-
C:\ProgramData\SHELL.TXTFilesize
1.2MB
MD5399dbed89b6eb31237ab085dbc18728a
SHA12ec1384fcbeef7122fc3ef97cb6a18ead214f7b8
SHA2569d1d6b9d33f33fb777706e4a48fe3efec12f32a0b19d16db45995451d71ed44a
SHA5124b4f7fd02754209b7527a7f1e68d87e072485e1bf12324850917afb384e59dc783170a0b11ec39acad2fea6753492ab07d8f610199074c1808a5bb3c7f42a1c4
-
C:\ProgramData\SHELL.iniFilesize
94B
MD50152439df609b41e4e0314303534dcc6
SHA17708dc87728d70cb230d9475154a44b82496d91c
SHA256765bab985a52c6a63ee1af27bce853626e16a8a53106893a3560e0a97dc5806e
SHA512ba80f943ad211c950cdd81f7d6e3caabf0db82227cd2eed340a76a21a6e56c21d2a2760e9acf89c78903f4c239e9df7db897e4e76a2ab7bb07242d9751c9f01c
-
C:\ProgramData\windows.exeFilesize
416KB
MD5dfc7f23c614f09dbd3c51b91177ec88b
SHA10d3b03a486fa37e0fddd7e59c5a329869c663633
SHA2563783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95
SHA51225e3d55463d672c18856598c9735e6d6b22152c2123769e1ebc8d13a6acc5843ff745ec1815d9f982b0b75f3036044baac326c8552a9a946eb787b3c4d8e3a7d
-
C:\ProgramData\windows.exeFilesize
416KB
MD5dfc7f23c614f09dbd3c51b91177ec88b
SHA10d3b03a486fa37e0fddd7e59c5a329869c663633
SHA2563783f305e648ec62701e1a3c57b8897e028a7294e77f8868eb72c04e41b4bb95
SHA51225e3d55463d672c18856598c9735e6d6b22152c2123769e1ebc8d13a6acc5843ff745ec1815d9f982b0b75f3036044baac326c8552a9a946eb787b3c4d8e3a7d
-
memory/460-138-0x0000000000000000-mapping.dmp
-
memory/2004-147-0x0000000000000000-mapping.dmp
-
memory/2492-140-0x0000000000000000-mapping.dmp
-
memory/2492-153-0x00000000025B0000-0x0000000002756000-memory.dmpFilesize
1.6MB
-
memory/2492-145-0x00000000025B0000-0x0000000002756000-memory.dmpFilesize
1.6MB
-
memory/2492-150-0x00000000025B0000-0x0000000002756000-memory.dmpFilesize
1.6MB
-
memory/2856-148-0x0000000000000000-mapping.dmp
-
memory/3996-149-0x0000000000000000-mapping.dmp
-
memory/4280-137-0x0000000000000000-mapping.dmp
-
memory/4324-146-0x0000000002F50000-0x00000000030F6000-memory.dmpFilesize
1.6MB
-
memory/4324-132-0x0000000002F50000-0x00000000030F6000-memory.dmpFilesize
1.6MB
-
memory/4324-134-0x0000000002F50000-0x00000000030F6000-memory.dmpFilesize
1.6MB
-
memory/4324-133-0x0000000002E10000-0x0000000002F49000-memory.dmpFilesize
1.2MB
-
memory/4552-139-0x0000000000000000-mapping.dmp
-
memory/4932-136-0x0000000000000000-mapping.dmp
-
memory/5036-135-0x0000000000000000-mapping.dmp