Analysis
-
max time kernel
2s -
max time network
3s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23-07-2023 17:30
Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_1bc9b02c777a32exeexe_JC.exe
Resource
win7-20230712-en
General
-
Target
NA_NA_1bc9b02c777a32exeexe_JC.exe
-
Size
1.4MB
-
MD5
1bc9b02c777a32f8a050e9fef3b5da75
-
SHA1
9c275fd2361f8973256bf30cc4641f2bd06c017f
-
SHA256
48510bebf306720ef131381ffac558d29d6794a382549f076f9aad1afc7fd587
-
SHA512
8a2df0d93115b1b4bc9eeb389cdd4a29e44b6d6bcc372969d1dba12d94e4f849a2aa2038848ca524ac3a6edaabd919fc02aea699ea69252a3e0b5be582f332ad
-
SSDEEP
24576:r09tv9/7JtDElDEExIko2H2HESq2eWJ6MQjySjy+/EBzkR/U:r09XJt4HIN2H2tFvduySpEd
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1640-62-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1640-63-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1640-62-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1640-63-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2408-71-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
Processes:
RVN.exeTXPlatforn.exepid process 1640 RVN.exe 2408 TXPlatforn.exe -
Loads dropped DLL 1 IoCs
Processes:
NA_NA_1bc9b02c777a32exeexe_JC.exepid process 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe -
Processes:
resource yara_rule behavioral1/memory/1640-59-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1640-62-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1640-63-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2408-71-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
RVN.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RVN.exedescription pid process Token: SeIncBasePriorityPrivilege 1640 RVN.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
NA_NA_1bc9b02c777a32exeexe_JC.exepid process 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
NA_NA_1bc9b02c777a32exeexe_JC.exedescription pid process target process PID 1712 wrote to memory of 1640 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe RVN.exe PID 1712 wrote to memory of 1640 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe RVN.exe PID 1712 wrote to memory of 1640 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe RVN.exe PID 1712 wrote to memory of 1640 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe RVN.exe PID 1712 wrote to memory of 1640 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe RVN.exe PID 1712 wrote to memory of 1640 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe RVN.exe PID 1712 wrote to memory of 1640 1712 NA_NA_1bc9b02c777a32exeexe_JC.exe RVN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_1bc9b02c777a32exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_1bc9b02c777a32exeexe_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵PID:2500
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
PID:2408 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵PID:2684
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4