Analysis
-
max time kernel
106s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 05:28
Static task
static1
Behavioral task
behavioral1
Sample
d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe
Resource
win7-20230831-en
General
-
Target
d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe
-
Size
4.7MB
-
MD5
eaa82730e762d30e490528fc23c5739c
-
SHA1
76b9d99d8812a58ab0d102558699acf21fa2ca17
-
SHA256
d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287
-
SHA512
c1438c8e448deb6c829ff327e41a0ff5a97fdf2706b069d017fd3624ecdaf30ab51cde7d6554a7de7c787342db8ecb55a230c761b690b2a7911e930187f2220a
-
SSDEEP
49152:TQZAdVyVT9n/Gg0P+WhoXvyn2vbXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHCr:UGdVyVT9nOgmhovyn2vbXsPN5kiQaZ56
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4348-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4348-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2648-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral2/memory/4348-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4348-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x00070000000231e3-15.dat family_gh0strat behavioral2/memory/2648-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4348-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x00070000000231e3-35.dat family_gh0strat behavioral2/memory/2648-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x00070000000231e3-34.dat family_gh0strat behavioral2/memory/2648-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4348 svchost.exe 3428 svchos.exe 2648 TXPlatforn.exe -
Loads dropped DLL 1 IoCs
pid Process 3428 svchos.exe -
resource yara_rule behavioral2/memory/4348-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4348-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4348-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2648-22-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2648-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4348-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2648-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2648-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240759890.txt svchos.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4660 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2824 wrote to memory of 4348 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe 88 PID 2824 wrote to memory of 4348 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe 88 PID 2824 wrote to memory of 4348 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe 88 PID 2824 wrote to memory of 3428 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe 91 PID 2824 wrote to memory of 3428 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe 91 PID 2824 wrote to memory of 3428 2824 d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe"C:\Users\Admin\AppData\Local\Temp\d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵PID:776
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:4660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\HD_d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exeC:\Users\Admin\AppData\Local\Temp\HD_d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe2⤵PID:5052
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵PID:3588
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:5060
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52bbbff342bcbea875d303cabbde04fe8
SHA1fa66e6c8787193cf7e955fcc5d2ad616f0381250
SHA256b77797ee5e1b15563de9b0e2874d0e7efe410419f76760e2a155f38a7cbfd7bb
SHA512a38735f67f2a9c56c894b251a5901257a9bd1d5633eeb8aff088d651931759afa9bfb95cb33b96ff0f54342a93120f265e5dc31a52507e77299570e05d0b023c
-
C:\Users\Admin\AppData\Local\Temp\HD_d47972b8b326f480e54ad028eeffc792c38e1fbec7a94583a18a79e4666d3287.exe
Filesize1.8MB
MD53c11a87df0e9af8bfa6a0e59fe806d66
SHA1ce479915f54969d8a8ac75bac4bd6d0ff9cbb9e9
SHA2562973c6733c5c39a82dbe37a50353e766203608695af5fc53f026c435dbc1a939
SHA512dc1e46187f2cd54d59c1be7d7787beaa2db6bfd7b7ec2bb421fd296b6e409506a2dc6d64bd48396d34d12fb3084d371f330d6cf870d4467202f23c93e77be64f
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD51379f4cbb18b072142f3f8ffa0236a40
SHA162e5c71fe8ed2c55248f2ef0847eb2b975a698c2
SHA2569a8523e20bd7b98cfca2a67c340b8d14b8325257cf567476b8c4001e9f4d44d8
SHA51269cf9adbf9dd53698b58a6ef9c9696fb32cb8dc50ed26c4256bd496ab3b832084646af0e720b251c410767031fa9f7cb7fde436725e03da5dce6162475cc71ed
-
Filesize
50KB
MD51379f4cbb18b072142f3f8ffa0236a40
SHA162e5c71fe8ed2c55248f2ef0847eb2b975a698c2
SHA2569a8523e20bd7b98cfca2a67c340b8d14b8325257cf567476b8c4001e9f4d44d8
SHA51269cf9adbf9dd53698b58a6ef9c9696fb32cb8dc50ed26c4256bd496ab3b832084646af0e720b251c410767031fa9f7cb7fde436725e03da5dce6162475cc71ed
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD51379f4cbb18b072142f3f8ffa0236a40
SHA162e5c71fe8ed2c55248f2ef0847eb2b975a698c2
SHA2569a8523e20bd7b98cfca2a67c340b8d14b8325257cf567476b8c4001e9f4d44d8
SHA51269cf9adbf9dd53698b58a6ef9c9696fb32cb8dc50ed26c4256bd496ab3b832084646af0e720b251c410767031fa9f7cb7fde436725e03da5dce6162475cc71ed