Shellex
Behavioral task
behavioral1
Sample
download.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
download.dll
Resource
win10v2004-20230703-en
General
-
Target
download.exe
-
Size
1.2MB
-
MD5
3fd34181978cd402ac4d79febf8cf38a
-
SHA1
47666948796987008e2ded94baa9185d2e79dc26
-
SHA256
2c16df586856e0d5ef10f27b6bafdf9c2445aa877d6a139f2eb4cd88a26f4003
-
SHA512
514ebe7e9e169de0fb95ac6d3ea0e108e46fe6e7e8525ebffd6bf93fd40f2a45856f513b63a7dbeda3d38ed7ad0eb1605b1f98a72ad297b8a74bf2355c22e1c5
-
SSDEEP
24576:NOsrLYC8sGCbCjNtiVqDli72BnrFM5GrkQPXHMtR1tD1rMtTdevK0iV/jU:ikcaGTdndU
Malware Config
Signatures
-
Processes:
resource yara_rule sample purplefox_rootkit -
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule sample family_gh0strat -
Gh0strat family
-
Purplefox family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource download.exe
Files
-
download.exe.dll windows x86
0cfdb6f49dcc4d75dfc1a02f3d10882c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateToolhelp32Snapshot
Process32Next
Process32First
ExitProcess
GetVersion
DeviceIoControl
Beep
MoveFileExA
CopyFileA
GetModuleFileNameA
GetVersionExA
TerminateProcess
OpenProcess
WinExec
TerminateThread
GetTickCount
GetCommandLineA
FreeConsole
GetCurrentProcessId
GetConsoleProcessList
AttachConsole
GetWindowsDirectoryA
WideCharToMultiByte
MultiByteToWideChar
GlobalSize
QueryPerformanceFrequency
QueryPerformanceCounter
LoadLibraryW
GetFileAttributesExA
GlobalMemoryStatusEx
GetSystemInfo
GetSystemDirectoryW
GetModuleFileNameW
WritePrivateProfileStringA
GetCurrentThread
GetEnvironmentVariableA
CreateMutexA
GetCurrentThreadId
lstrcpyW
Module32Next
lstrcmpiA
Module32First
CreateRemoteThread
GetProcessId
ResumeThread
OpenThread
Thread32Next
Thread32First
SuspendThread
GetPriorityClass
GlobalMemoryStatus
GetComputerNameA
SystemTimeToTzSpecificLocalTime
lstrcpynA
lstrcmpA
GetFullPathNameW
CreateFileW
GetModuleHandleW
FileTimeToSystemTime
MoveFileA
SetFileAttributesA
RemoveDirectoryA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrcpyA
CreateDirectoryA
GetLastError
GetProcAddress
DeleteFileA
GetCurrentProcess
IsWow64Process
SetFilePointer
WriteFile
LocalSize
GetSystemDirectoryA
GetFileAttributesA
CreateFileA
GetFileSize
ReadFile
lstrlenA
LocalReAlloc
LocalAlloc
LocalFree
FreeLibrary
IsBadReadPtr
VirtualProtect
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
Sleep
CancelIo
SetEvent
ResetEvent
CreateEventA
GetModuleHandleA
GetLocalTime
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
CreateThread
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
WaitForSingleObject
CloseHandle
LoadLibraryA
GetPrivateProfileStringA
user32
wsprintfA
MessageBoxA
CharNextA
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
EnumWindows
ExitWindowsEx
SwapMouseButton
GetWindowRect
MoveWindow
FindWindowA
ChangeDisplaySettingsA
GetSystemMetrics
GetDC
LoadCursorA
DestroyCursor
BlockInput
ReleaseDC
SystemParametersInfoA
keybd_event
ShowWindow
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
PostMessageA
SetCapture
WindowFromPoint
SetCursorPos
GetCursorInfo
GetCursorPos
SetRect
GetDesktopWindow
OpenInputDesktop
GetWindowThreadProcessId
WaitForInputIdle
RegisterClassExA
CreateWindowExA
DefWindowProcA
GetLastInputInfo
GetWindow
GetClassNameA
SendMessageA
IsWindowVisible
DispatchMessageA
TranslateMessage
GetWindowLongA
PostQuitMessage
SetWindowLongA
LoadIconA
SetClassLongA
DestroyWindow
GetDlgItemTextA
SetFocus
GetWindowTextLengthA
SetWindowTextA
SetDlgItemTextA
CreateDialogIndirectParamA
GetDlgItem
SetWindowPos
GetMessageA
IsDialogMessageA
CloseDesktop
GetThreadDesktop
GetUserObjectInformationA
SetThreadDesktop
MapVirtualKeyA
gdi32
CreateCompatibleBitmap
GetDIBits
CreateRectRgnIndirect
CombineRgn
GetRegionData
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
GetDeviceCaps
advapi32
UnlockServiceDatabase
GetTokenInformation
LookupAccountSidA
AbortSystemShutdownA
RegOpenKeyA
RegFlushKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
EnumServicesStatusA
QueryServiceConfigA
QueryServiceConfig2A
QueryServiceStatus
RegCloseKey
RegQueryValueA
RegOpenKeyExA
GetUserNameA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyA
StartServiceA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
SetServiceStatus
DeleteService
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegCreateKeyExA
ChangeServiceConfigA
LockServiceDatabase
ControlService
shell32
SHGetFolderPathA
SHGetSpecialFolderPathA
SHGetFileInfoA
ShellExecuteExA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysFreeString
mfc42
ord6283
ord4129
ord6662
ord4278
ord2763
ord6282
ord5710
ord535
ord536
ord939
ord6876
ord3663
ord1140
ord926
ord924
ord4202
ord2818
ord6143
ord354
ord5186
ord665
ord4204
ord2915
ord5442
ord5572
ord6874
ord2764
ord1979
ord356
ord858
ord537
ord922
ord2770
ord2781
ord4058
ord3178
ord1980
ord4215
ord3324
ord3310
ord3010
ord3304
ord3181
ord941
ord6883
ord668
ord2614
ord860
ord3811
ord800
ord541
ord540
ord801
ord825
ord823
ord940
ord5440
ord6383
ord5450
ord6394
ord2784
msvcrt
_except_handler3
strrchr
_strlwr
wcsstr
rand
system
swprintf
_splitpath
strncpy
atol
strncat
realloc
_stricmp
atoi
_errno
mbstowcs
wcstombs
_snprintf
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
_CxxThrowException
tolower
strchr
floor
_CIpow
strncmp
malloc
_iob
memmove
ceil
_ftol
free
wcslen
wcscpy
wcscat
sprintf
_wcsupr
_strcmpi
_itoa
_strnicmp
exit
fprintf
sscanf
getenv
vsprintf
strstr
__CxxFrameHandler
msvcp60
??1_Lockit@std@@QAE@XZ
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0_Lockit@std@@QAE@XZ
winmm
waveInGetNumDevs
mciSendStringA
ws2_32
bind
getsockname
sendto
getpeername
ntohs
inet_ntoa
send
recvfrom
accept
gethostname
__WSAFDIsSet
ioctlsocket
listen
select
inet_addr
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
closesocket
recv
socket
iphlpapi
GetIfTable
shlwapi
PathGetArgsA
PathFindFileNameA
SHDeleteKeyA
PathUnquoteSpacesA
PathRemoveArgsA
urlmon
URLDownloadToFileA
netapi32
NetUserAdd
NetUserGetLocalGroups
NetApiBufferFree
NetUserGetInfo
NetUserDel
NetUserSetInfo
NetLocalGroupAddMembers
NetUserEnum
psapi
GetProcessMemoryInfo
GetModuleFileNameExA
wininet
InternetGetConnectedState
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
wtsapi32
WTSEnumerateSessionsA
WTSQuerySessionInformationW
WTSDisconnectSession
WTSLogoffSession
WTSQuerySessionInformationA
WTSFreeMemory
Exports
Exports
Sections
.text Size: 608KB - Virtual size: 606KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rotext Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 196KB - Virtual size: 632KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ