Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28-08-2023 09:24
Static task
static1
Behavioral task
behavioral1
Sample
90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe
Resource
win7-20230712-en
General
-
Target
90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe
-
Size
6.3MB
-
MD5
0597492e98b160c2f4b8014a3978735e
-
SHA1
943bd576fc0129a22741453afb1fb16a71983add
-
SHA256
90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06
-
SHA512
225f8a38f4676152605e50dd782831f1578ff069bb2a6dc7c977552c13f7316d8e85d40d16fbc7dad43e7d10def1bb4dd57c352f989653b0eea19f56a1493a0f
-
SSDEEP
98304:fZJt4HIZOgmhUefS7peKOB3NLSiwbrM95+NTl:xiIZO7ye4pc3+rk5ql
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1956-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1956-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1956-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1536-31-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2648-66-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2648-68-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2648-71-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/memory/1956-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1956-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1536-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1956-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1536-31-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2648-66-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2648-68-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2648-71-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
pid Process 1956 QQ.exe 1536 TXPlatforn.exe 2648 TXPlatforn.exe 2152 HD_90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe -
Loads dropped DLL 3 IoCs
pid Process 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 1536 TXPlatforn.exe 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe -
resource yara_rule behavioral1/memory/1956-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1956-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1956-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1956-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1536-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1956-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1536-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2648-66-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2648-68-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2648-71-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe QQ.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe QQ.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2904 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2648 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1956 QQ.exe Token: SeLoadDriverPrivilege 2648 TXPlatforn.exe Token: 33 2648 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2648 TXPlatforn.exe Token: 33 2648 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2648 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2676 wrote to memory of 1956 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 28 PID 2676 wrote to memory of 1956 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 28 PID 2676 wrote to memory of 1956 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 28 PID 2676 wrote to memory of 1956 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 28 PID 2676 wrote to memory of 1956 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 28 PID 2676 wrote to memory of 1956 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 28 PID 2676 wrote to memory of 1956 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 28 PID 1956 wrote to memory of 1528 1956 QQ.exe 30 PID 1956 wrote to memory of 1528 1956 QQ.exe 30 PID 1956 wrote to memory of 1528 1956 QQ.exe 30 PID 1956 wrote to memory of 1528 1956 QQ.exe 30 PID 1536 wrote to memory of 2648 1536 TXPlatforn.exe 33 PID 1536 wrote to memory of 2648 1536 TXPlatforn.exe 33 PID 1536 wrote to memory of 2648 1536 TXPlatforn.exe 33 PID 1536 wrote to memory of 2648 1536 TXPlatforn.exe 33 PID 1536 wrote to memory of 2648 1536 TXPlatforn.exe 33 PID 1536 wrote to memory of 2648 1536 TXPlatforn.exe 33 PID 1536 wrote to memory of 2648 1536 TXPlatforn.exe 33 PID 2676 wrote to memory of 2152 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 32 PID 2676 wrote to memory of 2152 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 32 PID 2676 wrote to memory of 2152 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 32 PID 2676 wrote to memory of 2152 2676 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 32 PID 1528 wrote to memory of 2904 1528 cmd.exe 34 PID 1528 wrote to memory of 2904 1528 cmd.exe 34 PID 1528 wrote to memory of 2904 1528 cmd.exe 34 PID 1528 wrote to memory of 2904 1528 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe"C:\Users\Admin\AppData\Local\Temp\90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\QQ.exeC:\Users\Admin\AppData\Local\Temp\\QQ.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\QQ.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exeC:\Users\Admin\AppData\Local\Temp\HD_90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe2⤵
- Executes dropped EXE
PID:2152
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe
Filesize5.1MB
MD55a687d92e7e5b897d940a957c58f4b93
SHA1315ec2cc6837fd8065a410dabfc5afc192c4f856
SHA256e3eb80a72e7cd76dc24afd78a890e4d51ce0cb68586156167c9aba096b3fc75f
SHA5122d526d3e6b2ca1cb327b9f151794bd7aefbf8e9fff5d1b50b022afc4fb030fda60efb2ebf487217057efc4c740266d0e5441d5fdae60ee903c7e9052d2714089
-
Filesize
1.3MB
MD51b00ca3c90e4d409a1c42e38c8908efb
SHA14f1a731335a221cc396e87ecd8bf72c936bf4468
SHA256270c70adfb6ceb8b4c30e827215fea59078f8879bd4228f6f3b0d3980f986347
SHA5129721083227362d02bffd13b5dab1ee7f94effe5dae4246e131edf123e0e74212b0fb0fbbf2383d8d5347f2f2d9d24605c5fec2538ad8691b0357ee7a9726e7df
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
\Users\Admin\AppData\Local\Temp\HD_90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe
Filesize5.1MB
MD55a687d92e7e5b897d940a957c58f4b93
SHA1315ec2cc6837fd8065a410dabfc5afc192c4f856
SHA256e3eb80a72e7cd76dc24afd78a890e4d51ce0cb68586156167c9aba096b3fc75f
SHA5122d526d3e6b2ca1cb327b9f151794bd7aefbf8e9fff5d1b50b022afc4fb030fda60efb2ebf487217057efc4c740266d0e5441d5fdae60ee903c7e9052d2714089
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c