Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 11:29
Static task
static1
Behavioral task
behavioral1
Sample
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe
Resource
win7-20230220-en
General
-
Target
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe
-
Size
5.7MB
-
MD5
ffa7d3236dc39beeda2da5f2b0596776
-
SHA1
c1a6afa1fc069c2bf93b1dcd59a646db253720bb
-
SHA256
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639
-
SHA512
5016a5e3a483abfa841d2d8f33e7fbdb96bd4bd8119ae96a05cf2c5483f7fdbd5d7c333dfed63e9b94554637adebd982296e00e5fc2a3ffba3bd75e477349e7b
-
SSDEEP
98304:53YBvx6ppDENRyHDqAVMSBEzSmwAwfSqXgRfkgO6irkr5JfEw5zbLBJoAtv8YXny:WBv4ppDSDwMSCzSvAwKXormXLjdzwJ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1376-56-0x0000000010000000-0x0000000010042000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1376-56-0x0000000010000000-0x0000000010042000-memory.dmp family_gh0strat behavioral1/memory/1376-86-0x0000000005AE0000-0x0000000005C26000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\newϵͳËÙ¶ÈÓÅ»¯ = "C:\\Program Files\\MSXML 5.1\\rppCompating.exe" 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exedescription ioc process File opened (read-only) \??\N: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\O: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\P: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\W: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\Y: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\F: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\H: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\J: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\S: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\E: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\K: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\Q: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\T: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\U: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\X: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\V: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\Z: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\B: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\G: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\I: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\L: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\M: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened (read-only) \??\R: 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exepid process 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe -
Drops file in Program Files directory 3 IoCs
Processes:
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exedescription ioc process File opened for modification C:\Program Files\MSXML 5.1 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File created C:\Program Files\MSXML 5.1\rppCompating.exe 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe File opened for modification C:\Program Files\MSXML 5.1\rppCompating.exe 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exepid process 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exedescription pid process Token: SeDebugPrivilege 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exepid process 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe 1376 9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe"C:\Users\Admin\AppData\Local\Temp\9324c220867ead4a8d0d24dc888593081970c33dbc063f94f77beadbc8793639.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1376
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
499KB
MD56d5709a3ffbec9bc59dd2ceaf7c8536a
SHA1ab220f11cf0845a2695fd71f30afd18d126bd6f0
SHA256647a56901e4f2a009533eaff8dd32cc7d654c83a3a07c6b05e7be6731d8fcbde
SHA512dc7645a61810dd0c36b1e03e3e162f3568a380c87c4ae7054885c356449c2ab9972afccd0b96c23a1fe4a9a29b3a02a2cd08a856d304f5ef85ebc0b9cbb461fc