Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2023 17:24
Behavioral task
behavioral1
Sample
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe
Resource
win7-20230712-en
General
-
Target
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe
-
Size
456KB
-
MD5
5ec615ccfed7ff83c807ea70ec797542
-
SHA1
82ce31c4b2ca78fa5b9373b8da51eb77af0553eb
-
SHA256
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db
-
SHA512
f27ed255a3384115a3a3a02397753176e73f0ea154720d9f7e3181870283040f393868a8b4d3c07b2f4f8a82bd8e38f91bb0109de7a854db9c694f8ee1b22447
-
SSDEEP
12288:v8noxguizghvk2u+hbprhJysvBMBMQyOgZT8w2ja8:v6oazh2ltrhJPBSYOg7ua
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/728-137-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/728-138-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/728-139-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/1956-148-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/1956-149-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/1956-147-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/728-151-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/1956-156-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/2316-160-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/2316-159-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit behavioral2/memory/2316-161-0x0000000010000000-0x00000000101B8000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/728-137-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/728-138-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/728-139-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/1956-148-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/1956-149-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/1956-147-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/728-151-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/1956-156-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/2316-160-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/2316-159-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat behavioral2/memory/2316-161-0x0000000010000000-0x00000000101B8000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
Processes:
Stlme.exeStlme.exepid process 1956 Stlme.exe 2316 Stlme.exe -
Processes:
resource yara_rule behavioral2/memory/728-135-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/728-137-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/728-138-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/728-139-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/1956-145-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/1956-148-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/1956-149-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/1956-147-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/728-151-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/1956-156-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/2316-160-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/2316-159-0x0000000010000000-0x00000000101B8000-memory.dmp upx behavioral2/memory/2316-161-0x0000000010000000-0x00000000101B8000-memory.dmp upx -
Processes:
resource yara_rule behavioral2/memory/728-133-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect behavioral2/memory/728-134-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect C:\Windows\SysWOW64\Stlme.exe vmprotect C:\Windows\SysWOW64\Stlme.exe vmprotect behavioral2/memory/728-150-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect C:\Windows\SysWOW64\Stlme.exe vmprotect behavioral2/memory/1956-154-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect behavioral2/memory/2316-163-0x0000000000400000-0x00000000004D8000-memory.dmp vmprotect -
Drops file in System32 directory 2 IoCs
Processes:
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exedescription ioc process File created C:\Windows\SysWOW64\Stlme.exe 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe File opened for modification C:\Windows\SysWOW64\Stlme.exe 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exedescription pid process Token: SeIncBasePriorityPrivilege 728 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exeStlme.execmd.exedescription pid process target process PID 728 wrote to memory of 4920 728 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe cmd.exe PID 728 wrote to memory of 4920 728 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe cmd.exe PID 728 wrote to memory of 4920 728 79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe cmd.exe PID 1956 wrote to memory of 2316 1956 Stlme.exe Stlme.exe PID 1956 wrote to memory of 2316 1956 Stlme.exe Stlme.exe PID 1956 wrote to memory of 2316 1956 Stlme.exe Stlme.exe PID 4920 wrote to memory of 5064 4920 cmd.exe PING.EXE PID 4920 wrote to memory of 5064 4920 cmd.exe PING.EXE PID 4920 wrote to memory of 5064 4920 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe"C:\Users\Admin\AppData\Local\Temp\79fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\79FDAF~1.EXE > nul2⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:5064
-
-
-
C:\Windows\SysWOW64\Stlme.exeC:\Windows\SysWOW64\Stlme.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Stlme.exeC:\Windows\SysWOW64\Stlme.exe -acsi2⤵
- Executes dropped EXE
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD55ec615ccfed7ff83c807ea70ec797542
SHA182ce31c4b2ca78fa5b9373b8da51eb77af0553eb
SHA25679fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db
SHA512f27ed255a3384115a3a3a02397753176e73f0ea154720d9f7e3181870283040f393868a8b4d3c07b2f4f8a82bd8e38f91bb0109de7a854db9c694f8ee1b22447
-
Filesize
456KB
MD55ec615ccfed7ff83c807ea70ec797542
SHA182ce31c4b2ca78fa5b9373b8da51eb77af0553eb
SHA25679fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db
SHA512f27ed255a3384115a3a3a02397753176e73f0ea154720d9f7e3181870283040f393868a8b4d3c07b2f4f8a82bd8e38f91bb0109de7a854db9c694f8ee1b22447
-
Filesize
456KB
MD55ec615ccfed7ff83c807ea70ec797542
SHA182ce31c4b2ca78fa5b9373b8da51eb77af0553eb
SHA25679fdafce8486c84c63a01fa7353da03952fc430576f4f3d53ac8cdb517ec18db
SHA512f27ed255a3384115a3a3a02397753176e73f0ea154720d9f7e3181870283040f393868a8b4d3c07b2f4f8a82bd8e38f91bb0109de7a854db9c694f8ee1b22447