Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2023 03:04

General

  • Target

    5b5bf1eae9fdd580e2cd491710fbb2504e2f732b17859081eb29801ba61910d7.exe

  • Size

    4.2MB

  • MD5

    245dfa3c840b512606b8f80fc73c6177

  • SHA1

    0d2f0d1cbe901829b3ba1cba56581d502320e27c

  • SHA256

    5b5bf1eae9fdd580e2cd491710fbb2504e2f732b17859081eb29801ba61910d7

  • SHA512

    1065fa24d987e6814b82d8116af7893f7e163a8924884d2de1a4b87e6f010f17cbbcadd5618ba652aac482f8ae75fbd2b45d29567b97c6703e8d3d254321e5f0

  • SSDEEP

    98304:9jJ8Hh2puRYX3KmucWtLStPvUhMNvLWICyjShjCDMJJqKXDZFU:9jc2IiQBLS5vhLWGjShjC6dFU

Malware Config

Signatures

  • Detect PurpleFox Rootkit 1 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b5bf1eae9fdd580e2cd491710fbb2504e2f732b17859081eb29801ba61910d7.exe
    "C:\Users\Admin\AppData\Local\Temp\5b5bf1eae9fdd580e2cd491710fbb2504e2f732b17859081eb29801ba61910d7.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-54-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-55-0x000000007EBD0000-0x000000007EFA1000-memory.dmp
    Filesize

    3.8MB

  • memory/2200-56-0x0000000010000000-0x0000000010041000-memory.dmp
    Filesize

    260KB

  • memory/2200-63-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-64-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-65-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-66-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-67-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-68-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-69-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-70-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-71-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-72-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-73-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-74-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-75-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-76-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-77-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB

  • memory/2200-78-0x0000000000400000-0x00000000016A1000-memory.dmp
    Filesize

    18.6MB