Analysis

  • max time kernel
    172s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 08:55

General

  • Target

    6421213667f578589550be5d821ff9d67ab6bd851688fa9f8d01f9326640defa.exe

  • Size

    5.9MB

  • MD5

    32b5d810d53f87579985106a8e51d3ee

  • SHA1

    adb3818622e47920d56f97bf01c34d616c0da989

  • SHA256

    6421213667f578589550be5d821ff9d67ab6bd851688fa9f8d01f9326640defa

  • SHA512

    61fd5e3d08bb1189451ac8530cc31db174a1cf019660e6f9a52d25dd626898c0216d612b7d914313fcd0da0feb791f3db8e4ecadd1e55ada821e0a82e024da11

  • SSDEEP

    98304:I4uTo0ZeXgtCs0ItubSsLUYl5ahDynBhSpeRdJWBRcRE4q0Y:I4em0tuWBy02nqeVWXcs

Malware Config

Signatures

  • Detect PurpleFox Rootkit 2 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 12 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6421213667f578589550be5d821ff9d67ab6bd851688fa9f8d01f9326640defa.exe
    "C:\Users\Admin\AppData\Local\Temp\6421213667f578589550be5d821ff9d67ab6bd851688fa9f8d01f9326640defa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Roaming\¼Ó1.exe
      "C:\Users\Admin\AppData\Roaming\¼Ó1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Users\Admin\AppData\Local\Temp\25642.exe
        "C:\Users\Admin\AppData\Local\Temp\25642.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:900
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\25642.exe > nul
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1056
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 2 127.0.0.1
            5⤵
            • Runs ping.exe
            PID:1552
    • C:\Users\Admin\AppData\Roaming\HMCL-3.3.180.exe
      "C:\Users\Admin\AppData\Roaming\HMCL-3.3.180.exe"
      2⤵
      • Executes dropped EXE
      PID:856
  • C:\Windows\SysWOW64\Sklme.exe
    C:\Windows\SysWOW64\Sklme.exe -auto
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\SysWOW64\Sklme.exe
      C:\Windows\SysWOW64\Sklme.exe -acsi
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Sets service image path in registry
      • Enumerates connected drives
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Windows\SysWOW64\Sklme.exe > nul
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1584
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:760

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\25642.exe
    Filesize

    1.3MB

    MD5

    d06934e3b2d93ac67c39adef69f7a094

    SHA1

    3c55137848a51e20cbe7f04ec3045c0d3656b7d5

    SHA256

    c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

    SHA512

    b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

  • C:\Users\Admin\AppData\Local\Temp\25642.exe
    Filesize

    1.3MB

    MD5

    d06934e3b2d93ac67c39adef69f7a094

    SHA1

    3c55137848a51e20cbe7f04ec3045c0d3656b7d5

    SHA256

    c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

    SHA512

    b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

  • C:\Users\Admin\AppData\Roaming\HMCL-3.3.180.exe
    Filesize

    2.9MB

    MD5

    c368b71f5c632902d9db5d224529c6d1

    SHA1

    dad7ae3128253abbc917131c96e158ad1aba2b11

    SHA256

    33b81559da1c88239668499400638b6547a451eed2e45ad8cc6c60ef8fcd96ff

    SHA512

    910036c736ce984970a664801971a341f61410c135432827f40c8e560da58e6232d0a5e046f2a58753becb37f4ccf60333ad1b6bcfd4e7a398a557b928a7cec8

  • C:\Users\Admin\AppData\Roaming\¼Ó1.exe
    Filesize

    2.2MB

    MD5

    13008aa40eff08862d2a38db9601acb7

    SHA1

    9f8d24925b2d78df0f16f26a71372c425e058330

    SHA256

    395b6284ebb2fc43165a0f8c0fb3de015bcdf95dace9dbe12394024fdc404c17

    SHA512

    5b551a5270a8cb8e9dae312e284f3c3b4a6763e8f9c2fdedbdb2f5e7b952d8fc0f6ae9169228d13f4bced97c749ba026c443096fecd00f0c7be4f2d6ffe92a25

  • C:\Users\Admin\AppData\Roaming\¼Ó1.exe
    Filesize

    2.2MB

    MD5

    13008aa40eff08862d2a38db9601acb7

    SHA1

    9f8d24925b2d78df0f16f26a71372c425e058330

    SHA256

    395b6284ebb2fc43165a0f8c0fb3de015bcdf95dace9dbe12394024fdc404c17

    SHA512

    5b551a5270a8cb8e9dae312e284f3c3b4a6763e8f9c2fdedbdb2f5e7b952d8fc0f6ae9169228d13f4bced97c749ba026c443096fecd00f0c7be4f2d6ffe92a25

  • C:\Windows\SysWOW64\Sklme.exe
    Filesize

    1.3MB

    MD5

    d06934e3b2d93ac67c39adef69f7a094

    SHA1

    3c55137848a51e20cbe7f04ec3045c0d3656b7d5

    SHA256

    c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

    SHA512

    b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

  • C:\Windows\SysWOW64\Sklme.exe
    Filesize

    1.3MB

    MD5

    d06934e3b2d93ac67c39adef69f7a094

    SHA1

    3c55137848a51e20cbe7f04ec3045c0d3656b7d5

    SHA256

    c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

    SHA512

    b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

  • C:\Windows\SysWOW64\Sklme.exe
    Filesize

    1.3MB

    MD5

    d06934e3b2d93ac67c39adef69f7a094

    SHA1

    3c55137848a51e20cbe7f04ec3045c0d3656b7d5

    SHA256

    c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

    SHA512

    b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

  • \Users\Admin\AppData\Local\Temp\25642.exe
    Filesize

    1.3MB

    MD5

    d06934e3b2d93ac67c39adef69f7a094

    SHA1

    3c55137848a51e20cbe7f04ec3045c0d3656b7d5

    SHA256

    c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

    SHA512

    b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

  • \Users\Admin\AppData\Roaming\HMCL-3.3.180.exe
    Filesize

    2.9MB

    MD5

    c368b71f5c632902d9db5d224529c6d1

    SHA1

    dad7ae3128253abbc917131c96e158ad1aba2b11

    SHA256

    33b81559da1c88239668499400638b6547a451eed2e45ad8cc6c60ef8fcd96ff

    SHA512

    910036c736ce984970a664801971a341f61410c135432827f40c8e560da58e6232d0a5e046f2a58753becb37f4ccf60333ad1b6bcfd4e7a398a557b928a7cec8

  • \Users\Admin\AppData\Roaming\¼Ó1.exe
    Filesize

    2.2MB

    MD5

    13008aa40eff08862d2a38db9601acb7

    SHA1

    9f8d24925b2d78df0f16f26a71372c425e058330

    SHA256

    395b6284ebb2fc43165a0f8c0fb3de015bcdf95dace9dbe12394024fdc404c17

    SHA512

    5b551a5270a8cb8e9dae312e284f3c3b4a6763e8f9c2fdedbdb2f5e7b952d8fc0f6ae9169228d13f4bced97c749ba026c443096fecd00f0c7be4f2d6ffe92a25

  • \Users\Admin\AppData\Roaming\¼Ó1.exe
    Filesize

    2.2MB

    MD5

    13008aa40eff08862d2a38db9601acb7

    SHA1

    9f8d24925b2d78df0f16f26a71372c425e058330

    SHA256

    395b6284ebb2fc43165a0f8c0fb3de015bcdf95dace9dbe12394024fdc404c17

    SHA512

    5b551a5270a8cb8e9dae312e284f3c3b4a6763e8f9c2fdedbdb2f5e7b952d8fc0f6ae9169228d13f4bced97c749ba026c443096fecd00f0c7be4f2d6ffe92a25

  • memory/664-65-0x0000000000400000-0x00000000005BC000-memory.dmp
    Filesize

    1.7MB

  • memory/664-57-0x0000000000000000-mapping.dmp
  • memory/664-69-0x0000000000400000-0x00000000005BC000-memory.dmp
    Filesize

    1.7MB

  • memory/760-99-0x0000000000000000-mapping.dmp
  • memory/856-61-0x0000000000000000-mapping.dmp
  • memory/900-71-0x0000000010000000-0x000000001019F000-memory.dmp
    Filesize

    1.6MB

  • memory/900-67-0x0000000000000000-mapping.dmp
  • memory/1056-86-0x0000000000000000-mapping.dmp
  • memory/1460-54-0x0000000075BA1000-0x0000000075BA3000-memory.dmp
    Filesize

    8KB

  • memory/1552-96-0x0000000000000000-mapping.dmp
  • memory/1584-98-0x0000000000000000-mapping.dmp
  • memory/1980-87-0x0000000000000000-mapping.dmp
  • memory/1980-90-0x0000000010000000-0x000000001019F000-memory.dmp
    Filesize

    1.6MB