Analysis
-
max time kernel
143s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
12-02-2023 19:42
Static task
static1
Behavioral task
behavioral1
Sample
bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe
Resource
win10v2004-20221111-en
General
-
Target
bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe
-
Size
72KB
-
MD5
96ef8afa042404331636def662c83a9e
-
SHA1
578bc3973848495df63015d2b4d4ec9156ae2776
-
SHA256
bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff
-
SHA512
c2db17a51c007acbf8c033177862a5d08e0e0e5001810c1ac4ebecb7c7124f515247453ee4188d6ded9ac71be5313eb87aaa72a7c663789777caf79bcf1468b0
-
SSDEEP
384:nkNX5/j1/XiLSajU+322qiWspNdRA1E/VuXP3QAZx31zTm31CuU/S0Q+duWx/3:kNpJ/X8jU+mNwOKVMgAZxlEU/Sg3
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/316-69-0x0000000010000000-0x0000000010191000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/316-69-0x0000000010000000-0x0000000010191000-memory.dmp family_gh0strat -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 992 test.exe 316 2.exe -
Loads dropped DLL 3 IoCs
pid Process 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe -
resource yara_rule behavioral1/files/0x0007000000012750-55.dat upx behavioral1/files/0x0007000000012750-57.dat upx behavioral1/memory/992-65-0x0000000000890000-0x00000000008D0000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 2.exe File opened (read-only) \??\U: 2.exe File opened (read-only) \??\V: 2.exe File opened (read-only) \??\B: 2.exe File opened (read-only) \??\E: 2.exe File opened (read-only) \??\G: 2.exe File opened (read-only) \??\H: 2.exe File opened (read-only) \??\M: 2.exe File opened (read-only) \??\Z: 2.exe File opened (read-only) \??\T: 2.exe File opened (read-only) \??\W: 2.exe File opened (read-only) \??\F: 2.exe File opened (read-only) \??\L: 2.exe File opened (read-only) \??\N: 2.exe File opened (read-only) \??\O: 2.exe File opened (read-only) \??\P: 2.exe File opened (read-only) \??\Q: 2.exe File opened (read-only) \??\I: 2.exe File opened (read-only) \??\J: 2.exe File opened (read-only) \??\K: 2.exe File opened (read-only) \??\R: 2.exe File opened (read-only) \??\X: 2.exe File opened (read-only) \??\Y: 2.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\gpedit.msc mmc.exe File opened for modification C:\Windows\System32\GroupPolicy mmc.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 2.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main mmc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe 992 test.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 736 mmc.exe Token: SeIncBasePriorityPrivilege 736 mmc.exe Token: 33 736 mmc.exe Token: SeIncBasePriorityPrivilege 736 mmc.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 316 2.exe 736 mmc.exe 736 mmc.exe 736 mmc.exe 736 mmc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1380 wrote to memory of 992 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 30 PID 1380 wrote to memory of 992 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 30 PID 1380 wrote to memory of 992 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 30 PID 1380 wrote to memory of 992 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 30 PID 1380 wrote to memory of 316 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 31 PID 1380 wrote to memory of 316 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 31 PID 1380 wrote to memory of 316 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 31 PID 1380 wrote to memory of 316 1380 bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe 31 PID 992 wrote to memory of 1808 992 test.exe 32 PID 992 wrote to memory of 1808 992 test.exe 32 PID 992 wrote to memory of 1808 992 test.exe 32 PID 992 wrote to memory of 1808 992 test.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe"C:\Users\Admin\AppData\Local\Temp\bb946145a3856aa548b4e17d1cf9a4450b81b4e83a832554aefd5747834fa3ff.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\ProgramData\homo\test.exe"C:\ProgramData\homo\test.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\cmd.execmd /c start C:\ProgramData\1145143⤵PID:1808
-
-
-
C:\ProgramData\homo\2.exe"C:\ProgramData\homo\2.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:316
-
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\gpedit.msc"1⤵
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:736
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5c81194d14d4845bf013497d335b0e4fa
SHA1cecbee477d2642a957b0da6c2e176009192099db
SHA25603d572848afa63c68b2e7152957b17f839a7dac681d74888a516e24a98fa6ca1
SHA5127dc9668c7122e3fa2a1b66b270c8fb6dc35a4dd2bce1ce9c1440ac858950b1cbecc820343e035c4d2f88761a63d1ba9fdf1fcc090a42ea6e165c7e95b4b59d5e
-
Filesize
103KB
MD5fff506076c8b3e5a0947dacd74ab9c09
SHA1596a13421230a19d8ba704466085cac455ad6004
SHA256bd213f8096c5067ee562d087ee4c70f47a5d3f4f6eacd9e570ee7de91e4c58a7
SHA51267c0a44022b16f20b6584a973d571b2780d0dd31dcfefc5cebea55d68c1690d5ffc6d5eef66f32000a073ca5a9b54e971a1f7a37b7d1502bfd5637c6939d133a
-
Filesize
1.5MB
MD5c81194d14d4845bf013497d335b0e4fa
SHA1cecbee477d2642a957b0da6c2e176009192099db
SHA25603d572848afa63c68b2e7152957b17f839a7dac681d74888a516e24a98fa6ca1
SHA5127dc9668c7122e3fa2a1b66b270c8fb6dc35a4dd2bce1ce9c1440ac858950b1cbecc820343e035c4d2f88761a63d1ba9fdf1fcc090a42ea6e165c7e95b4b59d5e
-
Filesize
1.5MB
MD5c81194d14d4845bf013497d335b0e4fa
SHA1cecbee477d2642a957b0da6c2e176009192099db
SHA25603d572848afa63c68b2e7152957b17f839a7dac681d74888a516e24a98fa6ca1
SHA5127dc9668c7122e3fa2a1b66b270c8fb6dc35a4dd2bce1ce9c1440ac858950b1cbecc820343e035c4d2f88761a63d1ba9fdf1fcc090a42ea6e165c7e95b4b59d5e
-
Filesize
103KB
MD5fff506076c8b3e5a0947dacd74ab9c09
SHA1596a13421230a19d8ba704466085cac455ad6004
SHA256bd213f8096c5067ee562d087ee4c70f47a5d3f4f6eacd9e570ee7de91e4c58a7
SHA51267c0a44022b16f20b6584a973d571b2780d0dd31dcfefc5cebea55d68c1690d5ffc6d5eef66f32000a073ca5a9b54e971a1f7a37b7d1502bfd5637c6939d133a