Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2023 12:36

General

  • Target

    PurpleKnight.exe

  • Size

    100.4MB

  • MD5

    8c1579ee5fa7549a53180c3fe0cf2b91

  • SHA1

    bb010d17cdd7b6ca6c99fd0b17ab11af94360595

  • SHA256

    8b9e8326f25cfd8d1b9de0837232813216fc772523d102d43f1a1ed1ee1406fe

  • SHA512

    38e3a46a94ae3449b1c07426e5a64bb6e48c18b509e52031945e5e20ae3b5f740b115c464114431357bf724d4fbb22512367499bf1867c3e4941c39a4c97a7a5

  • SSDEEP

    3145728:sdPoQQ6ZLU91RWdeBzdnx2eU+vREzg2XhGjh:sdPox11D9Uz8P

Score
10/10

Malware Config

Signatures

  • CoreEntity .NET Packer 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PurpleKnight.exe
    "C:\Users\Admin\AppData\Local\Temp\PurpleKnight.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1184

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1184-132-0x00000279AF180000-0x00000279B0180000-memory.dmp
    Filesize

    16.0MB

  • memory/1184-133-0x00007FFECEF20000-0x00007FFECF9E1000-memory.dmp
    Filesize

    10.8MB

  • memory/1184-134-0x00000279D20B0000-0x00000279D20E8000-memory.dmp
    Filesize

    224KB

  • memory/1184-135-0x00000279CFC30000-0x00000279CFC3E000-memory.dmp
    Filesize

    56KB

  • memory/1184-136-0x00000279D5C30000-0x00000279D5C38000-memory.dmp
    Filesize

    32KB

  • memory/1184-137-0x00000279D5D40000-0x00000279D5D48000-memory.dmp
    Filesize

    32KB

  • memory/1184-138-0x00000279CFC89000-0x00000279CFC8F000-memory.dmp
    Filesize

    24KB

  • memory/1184-139-0x00000279D5C40000-0x00000279D5C44000-memory.dmp
    Filesize

    16KB

  • memory/1184-140-0x00000279D5C44000-0x00000279D5C47000-memory.dmp
    Filesize

    12KB

  • memory/1184-141-0x00007FFECEF20000-0x00007FFECF9E1000-memory.dmp
    Filesize

    10.8MB

  • memory/1184-143-0x00000279D5C44000-0x00000279D5C47000-memory.dmp
    Filesize

    12KB

  • memory/1184-142-0x00000279D5C40000-0x00000279D5C44000-memory.dmp
    Filesize

    16KB