Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
13-08-2023 19:56
Static task
static1
Behavioral task
behavioral1
Sample
64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe
Resource
win7-20230712-en
General
-
Target
64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe
-
Size
1.7MB
-
MD5
f5d902156d5783e57ec846b99a6aa5e8
-
SHA1
48359807bd69fc6402130938b4233a6c9883dd5c
-
SHA256
64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b
-
SHA512
29e25d91f74840522eb2549e0548f6278383b49fe16453dcfdcf2ab592ec07758b5e7ddd304c6947ff42887b54cf3a17a09bceadb8a9fa242c2f8f21f8c2cbf9
-
SSDEEP
24576:Jb2UYAkfXTDf2llPdlvyKqk59M58eI7t8MOjb9gOBf7B1d2b56L55yT+JjT31/RQ:g7H2PPzrM5XaeBgOFwQlsT+Jf1hRA3
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/624-8766-0x0000000000400000-0x000000000067E000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/624-8766-0x0000000000400000-0x000000000067E000-memory.dmp family_gh0strat -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exedescription ioc process File opened (read-only) \??\I: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\T: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\U: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\Y: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\P: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\Q: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\S: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\W: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\K: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\L: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\R: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\V: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\B: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\E: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\G: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\H: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\X: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\Z: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\J: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\M: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\N: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe File opened (read-only) \??\O: 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 28 IoCs
Processes:
64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exepid process 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exepid process 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exedescription pid process Token: 33 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe Token: SeIncBasePriorityPrivilege 624 64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe"C:\Users\Admin\AppData\Local\Temp\64c1d43d1d0418960df299b27eecdb492be53f11f37a6cbbc9e68d539476466b.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/624-54-0x0000000000400000-0x000000000067E000-memory.dmpFilesize
2.5MB
-
memory/624-55-0x0000000076BC0000-0x0000000076C07000-memory.dmpFilesize
284KB
-
memory/624-868-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-866-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-865-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-870-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-872-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-874-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-876-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-878-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-880-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-884-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-882-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-886-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-888-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-890-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-892-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-896-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-894-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-898-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-900-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-902-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-904-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-906-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-908-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-910-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-912-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-914-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-916-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-918-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-920-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-922-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-924-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-926-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-2601-0x0000000001F90000-0x0000000002090000-memory.dmpFilesize
1024KB
-
memory/624-2602-0x0000000002130000-0x00000000022B1000-memory.dmpFilesize
1.5MB
-
memory/624-4409-0x0000000001F90000-0x0000000002090000-memory.dmpFilesize
1024KB
-
memory/624-8742-0x00000000023E0000-0x00000000024F1000-memory.dmpFilesize
1.1MB
-
memory/624-8747-0x0000000000400000-0x000000000067E000-memory.dmpFilesize
2.5MB
-
memory/624-8766-0x0000000000400000-0x000000000067E000-memory.dmpFilesize
2.5MB