Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe
Resource
win7-20230712-en
General
-
Target
90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe
-
Size
6.3MB
-
MD5
0597492e98b160c2f4b8014a3978735e
-
SHA1
943bd576fc0129a22741453afb1fb16a71983add
-
SHA256
90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06
-
SHA512
225f8a38f4676152605e50dd782831f1578ff069bb2a6dc7c977552c13f7316d8e85d40d16fbc7dad43e7d10def1bb4dd57c352f989653b0eea19f56a1493a0f
-
SSDEEP
98304:fZJt4HIZOgmhUefS7peKOB3NLSiwbrM95+NTl:xiIZO7ye4pc3+rk5ql
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4764-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4764-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4764-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1664-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1664-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4764-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1664-22-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4612-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4612-44-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4612-60-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral2/memory/4764-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4764-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4764-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1664-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1664-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4764-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1664-22-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4612-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4612-44-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4612-60-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
pid Process 4764 QQ.exe 1664 TXPlatforn.exe 4612 TXPlatforn.exe 2188 HD_90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe -
resource yara_rule behavioral2/memory/4764-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4764-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4764-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4764-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4764-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1664-22-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4612-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4612-44-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4612-60-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe QQ.exe File created C:\Windows\SysWOW64\TXPlatforn.exe QQ.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 396 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5084 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 5084 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4612 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4764 QQ.exe Token: SeLoadDriverPrivilege 4612 TXPlatforn.exe Token: 33 4612 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4612 TXPlatforn.exe Token: 33 4612 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4612 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5084 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 5084 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4764 5084 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 81 PID 5084 wrote to memory of 4764 5084 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 81 PID 5084 wrote to memory of 4764 5084 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 81 PID 4764 wrote to memory of 3992 4764 QQ.exe 83 PID 4764 wrote to memory of 3992 4764 QQ.exe 83 PID 4764 wrote to memory of 3992 4764 QQ.exe 83 PID 1664 wrote to memory of 4612 1664 TXPlatforn.exe 85 PID 1664 wrote to memory of 4612 1664 TXPlatforn.exe 85 PID 1664 wrote to memory of 4612 1664 TXPlatforn.exe 85 PID 5084 wrote to memory of 2188 5084 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 84 PID 5084 wrote to memory of 2188 5084 90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe 84 PID 3992 wrote to memory of 396 3992 cmd.exe 87 PID 3992 wrote to memory of 396 3992 cmd.exe 87 PID 3992 wrote to memory of 396 3992 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe"C:\Users\Admin\AppData\Local\Temp\90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\QQ.exeC:\Users\Admin\AppData\Local\Temp\\QQ.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\QQ.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exeC:\Users\Admin\AppData\Local\Temp\HD_90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe2⤵
- Executes dropped EXE
PID:2188
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_90ed91fd6083bcdfef0f0ccdafa02356fbf93fa5915e31c75e6df95936efae06.exe
Filesize5.1MB
MD55a687d92e7e5b897d940a957c58f4b93
SHA1315ec2cc6837fd8065a410dabfc5afc192c4f856
SHA256e3eb80a72e7cd76dc24afd78a890e4d51ce0cb68586156167c9aba096b3fc75f
SHA5122d526d3e6b2ca1cb327b9f151794bd7aefbf8e9fff5d1b50b022afc4fb030fda60efb2ebf487217057efc4c740266d0e5441d5fdae60ee903c7e9052d2714089
-
Filesize
1.3MB
MD51b00ca3c90e4d409a1c42e38c8908efb
SHA14f1a731335a221cc396e87ecd8bf72c936bf4468
SHA256270c70adfb6ceb8b4c30e827215fea59078f8879bd4228f6f3b0d3980f986347
SHA5129721083227362d02bffd13b5dab1ee7f94effe5dae4246e131edf123e0e74212b0fb0fbbf2383d8d5347f2f2d9d24605c5fec2538ad8691b0357ee7a9726e7df
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c