Analysis
-
max time kernel
194s -
max time network
221s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 21:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d3e3b2de2bce779a60a5818aa59a98acfbc057d2ad71becb2b0abff8c382313e.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
General
-
Target
d3e3b2de2bce779a60a5818aa59a98acfbc057d2ad71becb2b0abff8c382313e.exe
-
Size
1.4MB
-
MD5
dd95913ad2887c625e7a430bf732a93f
-
SHA1
2558b15cf6b7a955265d34f67b5b616a76408f98
-
SHA256
d3e3b2de2bce779a60a5818aa59a98acfbc057d2ad71becb2b0abff8c382313e
-
SHA512
f76eb43cf85b724170055e77a2ff460d00c67cb446e86a993d11843b9bb9029e49de1a982fa43349b02aa26907b25feb96b7af2391c988b423db06d2b52293fe
-
SSDEEP
24576:ROeh7E7IJbtEJEHng8wGrQTLq73xaH7pbH:ROWFJbtSMXoTLq73xK
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2232-0-0x0000000010000000-0x0000000010199000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2232-0-0x0000000010000000-0x0000000010199000-memory.dmp family_gh0strat -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2232 d3e3b2de2bce779a60a5818aa59a98acfbc057d2ad71becb2b0abff8c382313e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2232 d3e3b2de2bce779a60a5818aa59a98acfbc057d2ad71becb2b0abff8c382313e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3e3b2de2bce779a60a5818aa59a98acfbc057d2ad71becb2b0abff8c382313e.exe"C:\Users\Admin\AppData\Local\Temp\d3e3b2de2bce779a60a5818aa59a98acfbc057d2ad71becb2b0abff8c382313e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2232