Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/10/2023, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe
Resource
win7-20230831-en
General
-
Target
eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe
-
Size
1.3MB
-
MD5
cb56cc60deb3a2343bed628135c1f4fb
-
SHA1
d9274628e0f6071df8b93e309330262f6f4ebd53
-
SHA256
eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b
-
SHA512
2c9cdac55425a31441d0d42c83ce229d694692bc6edafbada5fda2a488b3d092ff4fc93b67d7cab4b432a97749e38e995defd187ecdba3ad63149ab3cb6fadaa
-
SSDEEP
24576:W89tv9/7JtDElDEExIecl1erdg0MCiVWhR/Poh:W89XJt4HIZ/Gg0P+Whe
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1704-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1704-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1704-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2704-62-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2704-64-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2704-67-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2704-61-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2848-60-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/1704-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1704-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2848-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1704-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2704-62-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2704-64-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2704-67-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2704-61-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2848-60-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 3 IoCs
pid Process 1704 QQ.exe 2848 TXPlatforn.exe 2704 TXPlatforn.exe -
Loads dropped DLL 2 IoCs
pid Process 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe 2848 TXPlatforn.exe -
resource yara_rule behavioral1/memory/1704-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1704-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1704-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2848-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1704-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2704-62-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2704-64-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2704-67-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2704-61-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2848-60-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe QQ.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe QQ.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2536 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2704 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1704 QQ.exe Token: SeLoadDriverPrivilege 2704 TXPlatforn.exe Token: 33 2704 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2704 TXPlatforn.exe Token: 33 2704 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2704 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2956 wrote to memory of 1704 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe 28 PID 2956 wrote to memory of 1704 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe 28 PID 2956 wrote to memory of 1704 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe 28 PID 2956 wrote to memory of 1704 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe 28 PID 2956 wrote to memory of 1704 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe 28 PID 2956 wrote to memory of 1704 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe 28 PID 2956 wrote to memory of 1704 2956 eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe 28 PID 1704 wrote to memory of 2640 1704 QQ.exe 33 PID 1704 wrote to memory of 2640 1704 QQ.exe 33 PID 1704 wrote to memory of 2640 1704 QQ.exe 33 PID 1704 wrote to memory of 2640 1704 QQ.exe 33 PID 2848 wrote to memory of 2704 2848 TXPlatforn.exe 32 PID 2848 wrote to memory of 2704 2848 TXPlatforn.exe 32 PID 2848 wrote to memory of 2704 2848 TXPlatforn.exe 32 PID 2848 wrote to memory of 2704 2848 TXPlatforn.exe 32 PID 2848 wrote to memory of 2704 2848 TXPlatforn.exe 32 PID 2848 wrote to memory of 2704 2848 TXPlatforn.exe 32 PID 2848 wrote to memory of 2704 2848 TXPlatforn.exe 32 PID 2640 wrote to memory of 2536 2640 cmd.exe 31 PID 2640 wrote to memory of 2536 2640 cmd.exe 31 PID 2640 wrote to memory of 2536 2640 cmd.exe 31 PID 2640 wrote to memory of 2536 2640 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe"C:\Users\Admin\AppData\Local\Temp\eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\QQ.exeC:\Users\Admin\AppData\Local\Temp\\QQ.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\QQ.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2640
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.11⤵
- Runs ping.exe
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cb56cc60deb3a2343bed628135c1f4fb
SHA1d9274628e0f6071df8b93e309330262f6f4ebd53
SHA256eb858c884f6be11acb83f39a645481882f6a9d554995a059320609321b4d068b
SHA5122c9cdac55425a31441d0d42c83ce229d694692bc6edafbada5fda2a488b3d092ff4fc93b67d7cab4b432a97749e38e995defd187ecdba3ad63149ab3cb6fadaa
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c
-
Filesize
377KB
MD53d6e7db5800f1dadb016cbf989749e3c
SHA17c09c438a352cbc4de5d7279bf07d36e8f6cbfef
SHA256bb43f73ddd5d04adcd723061ccf3a535387fa439aba0039d39a72f5d6ae3062b
SHA512a98392c694a662a243581bc07582bffa9f425c4bd9acf2a68c19fbe95ee64f95ed4ca3100802736f67eea809a95fbf4f5e357800d3fa21f9d57b1f8d07d1462c