Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31/08/2023, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe
Resource
win7-20230712-en
General
-
Target
bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe
-
Size
1.5MB
-
MD5
c646338e3db607d1b05f4cc078656bbb
-
SHA1
2accdfe05e4d50a2c2dc5596313b9ed87cd09e14
-
SHA256
bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec
-
SHA512
3e98acaac466db3530fed1d7bc850f20b89b467d77d67c8c40f029e89cb796ef4fce94b49279ca975dc24402534bb6274e8dc2163e6dacb2a1c55db6f61c9715
-
SSDEEP
24576:eYVLN+uGOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:BTT3HPkVOBTK
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1324-0-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral1/memory/2788-18-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1324-0-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral1/memory/2788-18-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Jbrja.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Jbrja.exe -
Deletes itself 1 IoCs
pid Process 2876 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1636 Jbrja.exe 2788 Jbrja.exe -
Loads dropped DLL 1 IoCs
pid Process 1636 Jbrja.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Jbrja.exe bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe File opened for modification C:\Windows\SysWOW64\Jbrja.exe bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2936 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2788 Jbrja.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1324 bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe Token: SeLoadDriverPrivilege 2788 Jbrja.exe Token: 33 2788 Jbrja.exe Token: SeIncBasePriorityPrivilege 2788 Jbrja.exe Token: 33 2788 Jbrja.exe Token: SeIncBasePriorityPrivilege 2788 Jbrja.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1324 wrote to memory of 2876 1324 bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe 29 PID 1324 wrote to memory of 2876 1324 bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe 29 PID 1324 wrote to memory of 2876 1324 bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe 29 PID 1324 wrote to memory of 2876 1324 bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe 29 PID 1636 wrote to memory of 2788 1636 Jbrja.exe 30 PID 1636 wrote to memory of 2788 1636 Jbrja.exe 30 PID 1636 wrote to memory of 2788 1636 Jbrja.exe 30 PID 1636 wrote to memory of 2788 1636 Jbrja.exe 30 PID 2876 wrote to memory of 2936 2876 cmd.exe 32 PID 2876 wrote to memory of 2936 2876 cmd.exe 32 PID 2876 wrote to memory of 2936 2876 cmd.exe 32 PID 2876 wrote to memory of 2936 2876 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe"C:\Users\Admin\AppData\Local\Temp\bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\BED0C3~1.EXE > nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:2936
-
-
-
C:\Windows\SysWOW64\Jbrja.exeC:\Windows\SysWOW64\Jbrja.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\Jbrja.exeC:\Windows\SysWOW64\Jbrja.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5c646338e3db607d1b05f4cc078656bbb
SHA12accdfe05e4d50a2c2dc5596313b9ed87cd09e14
SHA256bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec
SHA5123e98acaac466db3530fed1d7bc850f20b89b467d77d67c8c40f029e89cb796ef4fce94b49279ca975dc24402534bb6274e8dc2163e6dacb2a1c55db6f61c9715
-
Filesize
1.5MB
MD5c646338e3db607d1b05f4cc078656bbb
SHA12accdfe05e4d50a2c2dc5596313b9ed87cd09e14
SHA256bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec
SHA5123e98acaac466db3530fed1d7bc850f20b89b467d77d67c8c40f029e89cb796ef4fce94b49279ca975dc24402534bb6274e8dc2163e6dacb2a1c55db6f61c9715
-
Filesize
1.5MB
MD5c646338e3db607d1b05f4cc078656bbb
SHA12accdfe05e4d50a2c2dc5596313b9ed87cd09e14
SHA256bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec
SHA5123e98acaac466db3530fed1d7bc850f20b89b467d77d67c8c40f029e89cb796ef4fce94b49279ca975dc24402534bb6274e8dc2163e6dacb2a1c55db6f61c9715
-
Filesize
1.5MB
MD5c646338e3db607d1b05f4cc078656bbb
SHA12accdfe05e4d50a2c2dc5596313b9ed87cd09e14
SHA256bed0c3698d2a4d0e10fff6678389831f8cd361fe9af7c59acec33dac8c67d6ec
SHA5123e98acaac466db3530fed1d7bc850f20b89b467d77d67c8c40f029e89cb796ef4fce94b49279ca975dc24402534bb6274e8dc2163e6dacb2a1c55db6f61c9715