Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
17/11/2023, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe
Resource
win7-20231020-en
General
-
Target
c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe
-
Size
15.4MB
-
MD5
3907b481feb88a9c7454e45fdfea29f0
-
SHA1
6b756215b35568bde687c8e2299ad2213bebb830
-
SHA256
c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599
-
SHA512
8ecee6c65c47114ae98a87d1e4fc691e28bd77f5755e9efe3ed1778885c8d6f6f6b6eb37537f7896ef4e5ae4cf2cd0a90aebd78d4eb3b6399900a38414e9210c
-
SSDEEP
393216:PPLvIfjMVueqs57PE5/9K0Ln5z3pHnEwfO43q2:PP8faueh5Gw0Dd31TO462
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2428-17-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit behavioral1/memory/2428-18-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit behavioral1/memory/2428-16-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit behavioral1/memory/2428-19-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit behavioral1/memory/2748-60-0x0000000010000000-0x00000000101A5000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2428-17-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat behavioral1/memory/2428-18-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat behavioral1/memory/2428-16-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat behavioral1/memory/2428-19-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat behavioral1/memory/2748-60-0x0000000010000000-0x00000000101A5000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2428 winhlp64.exe 2748 winhlp64.exe -
Loads dropped DLL 8 IoCs
pid Process 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 2428 winhlp64.exe 2428 winhlp64.exe 2428 winhlp64.exe 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 2748 winhlp64.exe 2748 winhlp64.exe 2748 winhlp64.exe -
resource yara_rule behavioral1/memory/2428-14-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral1/memory/2428-17-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral1/memory/2428-18-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral1/memory/2428-16-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral1/memory/2428-19-0x0000000010000000-0x00000000101A5000-memory.dmp upx behavioral1/memory/2748-60-0x0000000010000000-0x00000000101A5000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xczxd = "C:\\Program Files\\Common Files\\SJervices\\winhlp64.exe" c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\SJervices\winhlp64.exe c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe File opened for modification C:\Program Files\Common Files\SJervices\winhlp64.exe c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2428 winhlp64.exe Token: SeIncBasePriorityPrivilege 2428 winhlp64.exe Token: 33 2428 winhlp64.exe Token: SeIncBasePriorityPrivilege 2428 winhlp64.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2428 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 28 PID 2104 wrote to memory of 2428 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 28 PID 2104 wrote to memory of 2428 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 28 PID 2104 wrote to memory of 2428 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 28 PID 2104 wrote to memory of 2428 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 28 PID 2104 wrote to memory of 2428 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 28 PID 2104 wrote to memory of 2428 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 28 PID 2104 wrote to memory of 2748 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 29 PID 2104 wrote to memory of 2748 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 29 PID 2104 wrote to memory of 2748 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 29 PID 2104 wrote to memory of 2748 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 29 PID 2104 wrote to memory of 2748 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 29 PID 2104 wrote to memory of 2748 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 29 PID 2104 wrote to memory of 2748 2104 c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe"C:\Users\Admin\AppData\Local\Temp\c92b78a713a565438268b38961afb6afcd83d186dad635a242b562e8f1d8a599.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files\Common Files\SJervices\winhlp64.exe"C:\Program Files\Common Files\SJervices\winhlp64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Program Files\Common Files\SJervices\winhlp64.exe"C:\Program Files\Common Files\SJervices\winhlp64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74
-
Filesize
410KB
MD56b095d4de2a49276e91c0b98041f412b
SHA108329285e41b7cba66c4800d7a079273219685dc
SHA256712d1669f272f6476926ef2f982e0673cd0dd0b3279d9b3ebf5fef012d7fae9e
SHA512d0b804b523c42d418fb21f844cb197ce966fb4189bb909eca7aa9890f3c101b7b895bfae1e8afd41a2daf9a55806f520c489988a0096ea2bd504444564139d74