Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe
Resource
win10v2004-20231215-en
General
-
Target
62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe
-
Size
4.6MB
-
MD5
413d58c415fa4547a7126ea6321d23a9
-
SHA1
3a9c911496f4c2fcca114aaf8278a5e963227392
-
SHA256
62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3
-
SHA512
06eca03ffb223eb2ccb68f7f43fd9365fbbf13ad73780348c841607e868b13d50c726f7f0d98dc7a9e5ff155a2cd785a466f646d5575f6ed1520ebb47965313f
-
SSDEEP
98304:yXvUNEDFN6F6xoSgoxEspdJipIddobqWQl:yXXvxzxFU8d5W+
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2576-57-0x0000000010000000-0x00000000101B0000-memory.dmp purplefox_rootkit -
resource yara_rule behavioral1/memory/356-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/356-1-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2848 PING.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 356 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe 356 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe 356 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe"C:\Users\Admin\AppData\Local\Temp\62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:356 -
C:\Windows\Aqiyq.exeC:\Windows\Aqiyq.exe2⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Windows\Aqiyq.exe > nul3⤵PID:3012
-
-
-
C:\Windows\Aqiyq.exeC:\Windows\Aqiyq.exe -auto1⤵PID:2548
-
C:\Windows\Aqiyq.exeC:\Windows\Aqiyq.exe -acsi2⤵PID:2600
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.11⤵
- Runs ping.exe
PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54a00665d9e6ec86e48482a4b001550b5
SHA118aa59293e2adbce57ebf79000293ee51c98cf23
SHA25690ee90d62c8dc5f76098748f8fac0d2b1aaf333779e5a01e8162fded6314b5ba
SHA512842a944174fd8d04a5c71ccd9cc5dea8c1493c1dccc39c13bd9780015961422d6e67709d7090ae4bf752495c26780d919d8c3fc2a2179b5a1da1f91d83f92d04
-
Filesize
5KB
MD525f8d8dd7d493d5c8e3e45c6ca21700f
SHA1e1e501d7fe8ff738d4559fdf1def47e97e76eaed
SHA256f2c9aec73845ea6cdad8cdf0cd8958ecaf411e0756bdb26c6e3a451810924acc
SHA51276fc0937a341497115b1c65573e2df321cd9c53c27ac6b318eb342300bd5809aa12da76ec9b8a91efeb1bb3495d82f2785eff39b41cbe31bd9cbda8d63e73a8c
-
Filesize
53KB
MD57308aad4d36488a9389f2d242a7d9f8c
SHA1eb879687b0b953eb7795efef6bad9e87e1a83410
SHA256d547e3da1472015d895151fd66c6b0520e25cbce3dc33956dcbdab4efcc64aee
SHA5120cba240aed03b57a5233a5cc63f505cd278092866d601e9928f8c76ac5c21ecc1f0b87d8c71a7ef33a94729aac1592a23d9954f65ab2e8d62f6f7878f0ecd0e6
-
Filesize
36KB
MD5e774155f057b013e1569ca7371269493
SHA1dbab7e39f8f0f5f6cffdaf4576c5387deca2ed9e
SHA25649a90ac173697f2268f4dbf822bde913cc5a7faf7643e54744afd49fdca77667
SHA512aad851c1d226758479d75a36cde0efcfef5b6853d11984b78b00be4787f9446aea09bad946dde2d0b19a81f0f97dbee74f7d528ff19674392a1eae2b5bc17b8c
-
Filesize
24KB
MD556173050866cb0597c1085db208dabcb
SHA16aecbfecec72cc9bfb9b70c03bdfbe8fd9553bf3
SHA256c08e1b5ef4fd6b18726dd055ffc3dc90799199cbcc1917b4abcf8beebbb71e14
SHA5127113b438cff1ed370b152ef6dad2e86b27d04045f6b1fb211a07782bbe210957f16b436c6b424324b0a46102ba458564baa97a1734e79b37c00b716e0594d70a