Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
05-08-2023 17:24
Behavioral task
behavioral1
Sample
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe
Resource
win7-20230712-en
General
-
Target
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe
-
Size
456KB
-
MD5
5ec615ccfed7ff83c807ea70ec797542
-
SHA1
82ce31c4b2ca78fa5b9373b8da51eb77af0553eb
-
SHA256
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db
-
SHA512
f27ed255a3384115a3a3a02397753176e73f0ea154720d9f7e3181870283040f393868a8b4d3c07b2f4f8a82bd8e38f91bb0109de7a854db9c694f8ee1b22447
-
SSDEEP
12288:v8noxguizghvk2u+hbprhJysvBMBMQyOgZT8w2ja8:v6oazh2ltrhJPBSYOg7ua
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1988-60-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral1/memory/1988-59-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral1/memory/1988-74-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral1/memory/2296-78-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral1/memory/2328-83-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1988-58-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral1/memory/1988-60-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral1/memory/1988-59-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral1/memory/2296-69-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral1/memory/1988-74-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral1/memory/2296-78-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral1/memory/2328-83-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2364 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
Stlme.exeStlme.exepid process 2296 Stlme.exe 2328 Stlme.exe -
Loads dropped DLL 1 IoCs
Processes:
Stlme.exepid process 2296 Stlme.exe -
Processes:
resource yara_rule behavioral1/memory/1988-56-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral1/memory/1988-58-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral1/memory/1988-60-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral1/memory/1988-59-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral1/memory/2296-69-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral1/memory/1988-74-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral1/memory/2296-78-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral1/memory/2328-83-0x0000000010000000-0x00000000101B8000-memory.dmp upx -
Processes:
resource yara_rule behavioral1/memory/1988-55-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect behavioral1/memory/1988-54-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect C:\Windows\SysWOW64\Stlme.exe vmprotect behavioral1/memory/2296-64-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect behavioral1/memory/1988-73-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect C:\Windows\SysWOW64\Stlme.exe vmprotect \Windows\SysWOW64\Stlme.exe vmprotect C:\Windows\SysWOW64\Stlme.exe vmprotect behavioral1/memory/2296-75-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect behavioral1/memory/2328-85-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect -
Drops file in System32 directory 2 IoCs
Processes:
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exedescription ioc process File created C:\Windows\SysWOW64\Stlme.exe 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe File opened for modification C:\Windows\SysWOW64\Stlme.exe 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exedescription pid process Token: SeIncBasePriorityPrivilege 1988 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exeStlme.execmd.exedescription pid process target process PID 1988 wrote to memory of 2364 1988 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe cmd.exe PID 1988 wrote to memory of 2364 1988 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe cmd.exe PID 1988 wrote to memory of 2364 1988 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe cmd.exe PID 1988 wrote to memory of 2364 1988 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe cmd.exe PID 2296 wrote to memory of 2328 2296 Stlme.exe Stlme.exe PID 2296 wrote to memory of 2328 2296 Stlme.exe Stlme.exe PID 2296 wrote to memory of 2328 2296 Stlme.exe Stlme.exe PID 2296 wrote to memory of 2328 2296 Stlme.exe Stlme.exe PID 2364 wrote to memory of 2900 2364 cmd.exe PING.EXE PID 2364 wrote to memory of 2900 2364 cmd.exe PING.EXE PID 2364 wrote to memory of 2900 2364 cmd.exe PING.EXE PID 2364 wrote to memory of 2900 2364 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe"C:\Users\Admin\AppData\Local\Temp\79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\79FDAF~1.EXE > nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:2900
-
-
-
C:\Windows\SysWOW64\Stlme.exeC:\Windows\SysWOW64\Stlme.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Stlme.exeC:\Windows\SysWOW64\Stlme.exe -acsi2⤵
- Executes dropped EXE
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD55ec615ccfed7ff83c807ea70ec797542
SHA182ce31c4b2ca78fa5b9373b8da51eb77af0553eb
SHA25679fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db
SHA512f27ed255a3384115a3a3a02397753176e73f0ea154720d9f7e3181870283040f393868a8b4d3c07b2f4f8a82bd8e38f91bb0109de7a854db9c694f8ee1b22447
-
Filesize
456KB
MD55ec615ccfed7ff83c807ea70ec797542
SHA182ce31c4b2ca78fa5b9373b8da51eb77af0553eb
SHA25679fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db
SHA512f27ed255a3384115a3a3a02397753176e73f0ea154720d9f7e3181870283040f393868a8b4d3c07b2f4f8a82bd8e38f91bb0109de7a854db9c694f8ee1b22447
-
Filesize
456KB
MD55ec615ccfed7ff83c807ea70ec797542
SHA182ce31c4b2ca78fa5b9373b8da51eb77af0553eb
SHA25679fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db
SHA512f27ed255a3384115a3a3a02397753176e73f0ea154720d9f7e3181870283040f393868a8b4d3c07b2f4f8a82bd8e38f91bb0109de7a854db9c694f8ee1b22447
-
Filesize
456KB
MD55ec615ccfed7ff83c807ea70ec797542
SHA182ce31c4b2ca78fa5b9373b8da51eb77af0553eb
SHA25679fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db
SHA512f27ed255a3384115a3a3a02397753176e73f0ea154720d9f7e3181870283040f393868a8b4d3c07b2f4f8a82bd8e38f91bb0109de7a854db9c694f8ee1b22447