Analysis

  • max time kernel
    19s
  • max time network
    63s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 08:55

General

  • Target

    6421213667f578589550be5d821ff9d67ab6bd851688fa9f8d01f9326640defa.exe

  • Size

    5.9MB

  • MD5

    32b5d810d53f87579985106a8e51d3ee

  • SHA1

    adb3818622e47920d56f97bf01c34d616c0da989

  • SHA256

    6421213667f578589550be5d821ff9d67ab6bd851688fa9f8d01f9326640defa

  • SHA512

    61fd5e3d08bb1189451ac8530cc31db174a1cf019660e6f9a52d25dd626898c0216d612b7d914313fcd0da0feb791f3db8e4ecadd1e55ada821e0a82e024da11

  • SSDEEP

    98304:I4uTo0ZeXgtCs0ItubSsLUYl5ahDynBhSpeRdJWBRcRE4q0Y:I4em0tuWBy02nqeVWXcs

Malware Config

Signatures

  • Detect PurpleFox Rootkit 3 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6421213667f578589550be5d821ff9d67ab6bd851688fa9f8d01f9326640defa.exe
    "C:\Users\Admin\AppData\Local\Temp\6421213667f578589550be5d821ff9d67ab6bd851688fa9f8d01f9326640defa.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Roaming\¼Ó1.exe
      "C:\Users\Admin\AppData\Roaming\¼Ó1.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Users\Admin\AppData\Local\Temp\23666.exe
        "C:\Users\Admin\AppData\Local\Temp\23666.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3896
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\23666.exe > nul
          4⤵
            PID:2504
            • C:\Windows\SysWOW64\PING.EXE
              ping -n 2 127.0.0.1
              5⤵
              • Runs ping.exe
              PID:2340
      • C:\Users\Admin\AppData\Roaming\HMCL-3.3.180.exe
        "C:\Users\Admin\AppData\Roaming\HMCL-3.3.180.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4688
        • C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe
          "C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe" -XX:MinHeapFreeRatio=5 -XX:MaxHeapFreeRatio=15 -jar "C:\Users\Admin\AppData\Roaming\HMCL-3.3.180.exe"
          3⤵
            PID:1748
      • C:\Windows\SysWOW64\Sklme.exe
        C:\Windows\SysWOW64\Sklme.exe -auto
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Windows\SysWOW64\Sklme.exe
          C:\Windows\SysWOW64\Sklme.exe -acsi
          2⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Sets service image path in registry
          • Enumerates connected drives
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: LoadsDriver
          • Suspicious use of AdjustPrivilegeToken
          PID:3708

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      4
      T1082

      Peripheral Device Discovery

      1
      T1120

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\23666.exe
        Filesize

        1.3MB

        MD5

        d06934e3b2d93ac67c39adef69f7a094

        SHA1

        3c55137848a51e20cbe7f04ec3045c0d3656b7d5

        SHA256

        c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

        SHA512

        b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

      • C:\Users\Admin\AppData\Local\Temp\23666.exe
        Filesize

        1.3MB

        MD5

        d06934e3b2d93ac67c39adef69f7a094

        SHA1

        3c55137848a51e20cbe7f04ec3045c0d3656b7d5

        SHA256

        c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

        SHA512

        b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

      • C:\Users\Admin\AppData\Roaming\HMCL-3.3.180.exe
        Filesize

        2.9MB

        MD5

        c368b71f5c632902d9db5d224529c6d1

        SHA1

        dad7ae3128253abbc917131c96e158ad1aba2b11

        SHA256

        33b81559da1c88239668499400638b6547a451eed2e45ad8cc6c60ef8fcd96ff

        SHA512

        910036c736ce984970a664801971a341f61410c135432827f40c8e560da58e6232d0a5e046f2a58753becb37f4ccf60333ad1b6bcfd4e7a398a557b928a7cec8

      • C:\Users\Admin\AppData\Roaming\HMCL-3.3.180.exe
        Filesize

        2.9MB

        MD5

        c368b71f5c632902d9db5d224529c6d1

        SHA1

        dad7ae3128253abbc917131c96e158ad1aba2b11

        SHA256

        33b81559da1c88239668499400638b6547a451eed2e45ad8cc6c60ef8fcd96ff

        SHA512

        910036c736ce984970a664801971a341f61410c135432827f40c8e560da58e6232d0a5e046f2a58753becb37f4ccf60333ad1b6bcfd4e7a398a557b928a7cec8

      • C:\Users\Admin\AppData\Roaming\¼Ó1.exe
        Filesize

        2.2MB

        MD5

        13008aa40eff08862d2a38db9601acb7

        SHA1

        9f8d24925b2d78df0f16f26a71372c425e058330

        SHA256

        395b6284ebb2fc43165a0f8c0fb3de015bcdf95dace9dbe12394024fdc404c17

        SHA512

        5b551a5270a8cb8e9dae312e284f3c3b4a6763e8f9c2fdedbdb2f5e7b952d8fc0f6ae9169228d13f4bced97c749ba026c443096fecd00f0c7be4f2d6ffe92a25

      • C:\Users\Admin\AppData\Roaming\¼Ó1.exe
        Filesize

        2.2MB

        MD5

        13008aa40eff08862d2a38db9601acb7

        SHA1

        9f8d24925b2d78df0f16f26a71372c425e058330

        SHA256

        395b6284ebb2fc43165a0f8c0fb3de015bcdf95dace9dbe12394024fdc404c17

        SHA512

        5b551a5270a8cb8e9dae312e284f3c3b4a6763e8f9c2fdedbdb2f5e7b952d8fc0f6ae9169228d13f4bced97c749ba026c443096fecd00f0c7be4f2d6ffe92a25

      • C:\Windows\SysWOW64\Sklme.exe
        Filesize

        1.3MB

        MD5

        d06934e3b2d93ac67c39adef69f7a094

        SHA1

        3c55137848a51e20cbe7f04ec3045c0d3656b7d5

        SHA256

        c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

        SHA512

        b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

      • C:\Windows\SysWOW64\Sklme.exe
        Filesize

        1.3MB

        MD5

        d06934e3b2d93ac67c39adef69f7a094

        SHA1

        3c55137848a51e20cbe7f04ec3045c0d3656b7d5

        SHA256

        c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

        SHA512

        b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

      • C:\Windows\SysWOW64\Sklme.exe
        Filesize

        1.3MB

        MD5

        d06934e3b2d93ac67c39adef69f7a094

        SHA1

        3c55137848a51e20cbe7f04ec3045c0d3656b7d5

        SHA256

        c437aa78f3ff9baeb3ad981ab1f60a80e22a078fb1f4ccf7725b02fb40604fde

        SHA512

        b9219f772bdfa6378ba2bd724751f8a098fe2d3b2ec5d540c0d89f9be9bc1bba8aa001c379128b695def31267dc5ca04fbcbf30afcf259d101ca3a3fc9d5ac4b

      • memory/1748-144-0x0000000002E90000-0x0000000003E90000-memory.dmp
        Filesize

        16.0MB

      • memory/1748-215-0x0000000002E90000-0x0000000003E90000-memory.dmp
        Filesize

        16.0MB

      • memory/1748-211-0x0000000002E90000-0x0000000003E90000-memory.dmp
        Filesize

        16.0MB

      • memory/1748-202-0x0000000002E90000-0x0000000003E90000-memory.dmp
        Filesize

        16.0MB

      • memory/1748-138-0x0000000000000000-mapping.dmp
      • memory/1748-197-0x0000000002E90000-0x0000000003E90000-memory.dmp
        Filesize

        16.0MB

      • memory/2340-199-0x0000000000000000-mapping.dmp
      • memory/2504-168-0x0000000000000000-mapping.dmp
      • memory/3488-162-0x0000000010000000-0x000000001019F000-memory.dmp
        Filesize

        1.6MB

      • memory/3708-169-0x0000000000000000-mapping.dmp
      • memory/3708-171-0x0000000010000000-0x000000001019F000-memory.dmp
        Filesize

        1.6MB

      • memory/3896-150-0x0000000000000000-mapping.dmp
      • memory/3896-154-0x0000000010000000-0x000000001019F000-memory.dmp
        Filesize

        1.6MB

      • memory/4092-132-0x0000000000000000-mapping.dmp
      • memory/4092-141-0x0000000000400000-0x00000000005BC000-memory.dmp
        Filesize

        1.7MB

      • memory/4092-153-0x0000000000400000-0x00000000005BC000-memory.dmp
        Filesize

        1.7MB

      • memory/4688-135-0x0000000000000000-mapping.dmp