Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2023 08:12
Static task
static1
Behavioral task
behavioral1
Sample
db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe
Resource
win7-20230712-en
General
-
Target
db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe
-
Size
377KB
-
MD5
2b91f682c9bb6972cb528b53e8bee47a
-
SHA1
84421fbbab84281dd22b7c7c669f042793332b02
-
SHA256
db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5
-
SHA512
127d4dd80a4cc17324ed8d524947aec6b0cdfc462fb2de24e1b0df4d971c1ad59a9352e186854621396959f6a4c49749c0ecfa0f35dcddf27176e8165a5d183e
-
SSDEEP
6144:5UGp2l6zRmeVLNHfkQ2TAygOcqAJwQZgb4YtjH6/MuQafORzEOmFfMzi71o+YHL7:HclcceBKlKwAg0Mja/UafOVwbha
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2128-3-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2128-4-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4744-11-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4744-13-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4744-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2332-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2128-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2332-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2332-22-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2332-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2332-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 13 IoCs
resource yara_rule behavioral2/memory/2128-3-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2128-4-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2128-2-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4744-12-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4744-11-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4744-13-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4744-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2332-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2128-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2332-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2332-22-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2332-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2332-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 2 IoCs
pid Process 4744 TXPlatfor.exe 2332 TXPlatfor.exe -
resource yara_rule behavioral2/memory/2128-0-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2128-3-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2128-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2128-2-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4744-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4744-12-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4744-11-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4744-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4744-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2332-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2128-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2332-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2332-22-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2332-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2332-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatfor.exe db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1752 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2332 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2128 db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe Token: SeLoadDriverPrivilege 2332 TXPlatfor.exe Token: 33 2332 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2332 TXPlatfor.exe Token: 33 2332 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2332 TXPlatfor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4744 wrote to memory of 2332 4744 TXPlatfor.exe 85 PID 4744 wrote to memory of 2332 4744 TXPlatfor.exe 85 PID 4744 wrote to memory of 2332 4744 TXPlatfor.exe 85 PID 2128 wrote to memory of 4344 2128 db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe 86 PID 2128 wrote to memory of 4344 2128 db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe 86 PID 2128 wrote to memory of 4344 2128 db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe 86 PID 4344 wrote to memory of 1752 4344 cmd.exe 88 PID 4344 wrote to memory of 1752 4344 cmd.exe 88 PID 4344 wrote to memory of 1752 4344 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe"C:\Users\Admin\AppData\Local\Temp\db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\DB79FC~1.EXE > nul2⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:1752
-
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD52b91f682c9bb6972cb528b53e8bee47a
SHA184421fbbab84281dd22b7c7c669f042793332b02
SHA256db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5
SHA512127d4dd80a4cc17324ed8d524947aec6b0cdfc462fb2de24e1b0df4d971c1ad59a9352e186854621396959f6a4c49749c0ecfa0f35dcddf27176e8165a5d183e
-
Filesize
377KB
MD52b91f682c9bb6972cb528b53e8bee47a
SHA184421fbbab84281dd22b7c7c669f042793332b02
SHA256db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5
SHA512127d4dd80a4cc17324ed8d524947aec6b0cdfc462fb2de24e1b0df4d971c1ad59a9352e186854621396959f6a4c49749c0ecfa0f35dcddf27176e8165a5d183e
-
Filesize
377KB
MD52b91f682c9bb6972cb528b53e8bee47a
SHA184421fbbab84281dd22b7c7c669f042793332b02
SHA256db79fc947d0faa6616d176c90d1903cdda62bb545a642c18c2133205519ab6e5
SHA512127d4dd80a4cc17324ed8d524947aec6b0cdfc462fb2de24e1b0df4d971c1ad59a9352e186854621396959f6a4c49749c0ecfa0f35dcddf27176e8165a5d183e