Analysis
-
max time kernel
156s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25/08/2023, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe
Resource
win7-20230712-en
General
-
Target
a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe
-
Size
1.5MB
-
MD5
479edee4efdcfc889721cce7c45e1b5f
-
SHA1
05763812750ffa94d9df4a2128617d0bbe9df4b9
-
SHA256
a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0
-
SHA512
cbbc8ca8c33a64bca332f019cf6518fbff05c3dab2aabe4adb2f3651ec9f8bbd2e5b251005fcc5fde03447f5ced1d5666eaae2dee8d824332b3c92271a79213e
-
SSDEEP
24576:589tv9/7JtDElDEExIecl1erdg0MCiVWhR/G1cvsFH1j:589XJt4HIZ/Gg0P+Whvw
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2520-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2520-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2520-24-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2356-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2852-34-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2852-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2852-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2520-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2520-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2356-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2520-24-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2356-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2852-34-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2852-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2852-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
pid Process 2520 QQ.exe 2356 TXPlatforn.exe 2852 TXPlatforn.exe 2912 HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe -
Loads dropped DLL 7 IoCs
pid Process 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 2356 TXPlatforn.exe 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe -
resource yara_rule behavioral1/memory/2520-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2520-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2520-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2520-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2356-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2520-24-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2356-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2852-34-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2852-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2852-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe QQ.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe QQ.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2956 2912 WerFault.exe 32 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1080 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2852 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2520 QQ.exe Token: SeLoadDriverPrivilege 2852 TXPlatforn.exe Token: 33 2852 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2852 TXPlatforn.exe Token: 33 2852 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2852 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2520 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 27 PID 2372 wrote to memory of 2520 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 27 PID 2372 wrote to memory of 2520 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 27 PID 2372 wrote to memory of 2520 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 27 PID 2372 wrote to memory of 2520 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 27 PID 2372 wrote to memory of 2520 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 27 PID 2372 wrote to memory of 2520 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 27 PID 2520 wrote to memory of 2464 2520 QQ.exe 29 PID 2520 wrote to memory of 2464 2520 QQ.exe 29 PID 2520 wrote to memory of 2464 2520 QQ.exe 29 PID 2520 wrote to memory of 2464 2520 QQ.exe 29 PID 2356 wrote to memory of 2852 2356 TXPlatforn.exe 30 PID 2356 wrote to memory of 2852 2356 TXPlatforn.exe 30 PID 2356 wrote to memory of 2852 2356 TXPlatforn.exe 30 PID 2356 wrote to memory of 2852 2356 TXPlatforn.exe 30 PID 2356 wrote to memory of 2852 2356 TXPlatforn.exe 30 PID 2356 wrote to memory of 2852 2356 TXPlatforn.exe 30 PID 2356 wrote to memory of 2852 2356 TXPlatforn.exe 30 PID 2372 wrote to memory of 2912 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 32 PID 2372 wrote to memory of 2912 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 32 PID 2372 wrote to memory of 2912 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 32 PID 2372 wrote to memory of 2912 2372 a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 32 PID 2912 wrote to memory of 2956 2912 HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 33 PID 2912 wrote to memory of 2956 2912 HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 33 PID 2912 wrote to memory of 2956 2912 HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 33 PID 2912 wrote to memory of 2956 2912 HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe 33 PID 2464 wrote to memory of 1080 2464 cmd.exe 34 PID 2464 wrote to memory of 1080 2464 cmd.exe 34 PID 2464 wrote to memory of 1080 2464 cmd.exe 34 PID 2464 wrote to memory of 1080 2464 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe"C:\Users\Admin\AppData\Local\Temp\a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\QQ.exeC:\Users\Admin\AppData\Local\Temp\\QQ.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\QQ.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:1080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exeC:\Users\Admin\AppData\Local\Temp\HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 2203⤵
- Loads dropped DLL
- Program crash
PID:2956
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD509d4fa05a01982be024f1cb8c4f8d8e1
SHA1ba551ea6750b5553881b1d319c3c7fdfb3ad56db
SHA256a39bcf594691b188be570709d3d3df5b518051f5d7b70abb187d6354802fc330
SHA512bf74a5866356c46b233b5d08451b0f4670d7734770d299cdebaf6f50a26d5b5edac9870a838b8ccd98c65e905f4f3778b9156fafb297ba32e16a02a4388c6a84
-
C:\Users\Admin\AppData\Local\Temp\HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe
Filesize195KB
MD560c3a22afb17eaa2cfc0e63334483441
SHA10fd6d27c02397352311771c7c0f2a4b13fb83c5a
SHA2563143a6cf4aeb3ccfd3b4e4c0296c820241ba5e0f1ca34e76d868e7a1c6721cde
SHA5126230135e8c50ca084b6d0946758a876006800c8a874d6f2253b529fda6bb770d670e38ea8a9f5c3207738aa4ec77406d7154d85a33302ca9aeb34732e9c7f507
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
\Users\Admin\AppData\Local\Temp\HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe
Filesize195KB
MD560c3a22afb17eaa2cfc0e63334483441
SHA10fd6d27c02397352311771c7c0f2a4b13fb83c5a
SHA2563143a6cf4aeb3ccfd3b4e4c0296c820241ba5e0f1ca34e76d868e7a1c6721cde
SHA5126230135e8c50ca084b6d0946758a876006800c8a874d6f2253b529fda6bb770d670e38ea8a9f5c3207738aa4ec77406d7154d85a33302ca9aeb34732e9c7f507
-
\Users\Admin\AppData\Local\Temp\HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe
Filesize195KB
MD560c3a22afb17eaa2cfc0e63334483441
SHA10fd6d27c02397352311771c7c0f2a4b13fb83c5a
SHA2563143a6cf4aeb3ccfd3b4e4c0296c820241ba5e0f1ca34e76d868e7a1c6721cde
SHA5126230135e8c50ca084b6d0946758a876006800c8a874d6f2253b529fda6bb770d670e38ea8a9f5c3207738aa4ec77406d7154d85a33302ca9aeb34732e9c7f507
-
\Users\Admin\AppData\Local\Temp\HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe
Filesize195KB
MD560c3a22afb17eaa2cfc0e63334483441
SHA10fd6d27c02397352311771c7c0f2a4b13fb83c5a
SHA2563143a6cf4aeb3ccfd3b4e4c0296c820241ba5e0f1ca34e76d868e7a1c6721cde
SHA5126230135e8c50ca084b6d0946758a876006800c8a874d6f2253b529fda6bb770d670e38ea8a9f5c3207738aa4ec77406d7154d85a33302ca9aeb34732e9c7f507
-
\Users\Admin\AppData\Local\Temp\HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe
Filesize195KB
MD560c3a22afb17eaa2cfc0e63334483441
SHA10fd6d27c02397352311771c7c0f2a4b13fb83c5a
SHA2563143a6cf4aeb3ccfd3b4e4c0296c820241ba5e0f1ca34e76d868e7a1c6721cde
SHA5126230135e8c50ca084b6d0946758a876006800c8a874d6f2253b529fda6bb770d670e38ea8a9f5c3207738aa4ec77406d7154d85a33302ca9aeb34732e9c7f507
-
\Users\Admin\AppData\Local\Temp\HD_a17f4b2b4f03a3927ef83d93cd453be375ff70f01fad4fd02c0a31f46dce9fb0.exe
Filesize195KB
MD560c3a22afb17eaa2cfc0e63334483441
SHA10fd6d27c02397352311771c7c0f2a4b13fb83c5a
SHA2563143a6cf4aeb3ccfd3b4e4c0296c820241ba5e0f1ca34e76d868e7a1c6721cde
SHA5126230135e8c50ca084b6d0946758a876006800c8a874d6f2253b529fda6bb770d670e38ea8a9f5c3207738aa4ec77406d7154d85a33302ca9aeb34732e9c7f507
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c