Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 12:29
Static task
static1
Behavioral task
behavioral1
Sample
62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe
Resource
win10v2004-20231215-en
General
-
Target
62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe
-
Size
4.6MB
-
MD5
413d58c415fa4547a7126ea6321d23a9
-
SHA1
3a9c911496f4c2fcca114aaf8278a5e963227392
-
SHA256
62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3
-
SHA512
06eca03ffb223eb2ccb68f7f43fd9365fbbf13ad73780348c841607e868b13d50c726f7f0d98dc7a9e5ff155a2cd785a466f646d5575f6ed1520ebb47965313f
-
SSDEEP
98304:yXvUNEDFN6F6xoSgoxEspdJipIddobqWQl:yXXvxzxFU8d5W+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2508-62-0x0000000010000000-0x00000000101B0000-memory.dmp purplefox_rootkit behavioral2/memory/5056-70-0x0000000010000000-0x00000000101B0000-memory.dmp purplefox_rootkit behavioral2/memory/4952-78-0x0000000010000000-0x00000000101B0000-memory.dmp purplefox_rootkit -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Aqiyq.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Aqiyq.exe -
Executes dropped EXE 3 IoCs
pid Process 2508 Aqiyq.exe 5056 Aqiyq.exe 4952 Aqiyq.exe -
resource yara_rule behavioral2/memory/4024-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/4024-51-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Aqiyq.exe 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe File opened for modification C:\Windows\Aqiyq.exe Aqiyq.exe File created C:\Windows\Aqiyq.exe 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4080 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4952 Aqiyq.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2508 Aqiyq.exe Token: SeLoadDriverPrivilege 4952 Aqiyq.exe Token: 33 4952 Aqiyq.exe Token: SeIncBasePriorityPrivilege 4952 Aqiyq.exe Token: 33 4952 Aqiyq.exe Token: SeIncBasePriorityPrivilege 4952 Aqiyq.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4024 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe 4024 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe 4024 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4024 wrote to memory of 2508 4024 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe 91 PID 4024 wrote to memory of 2508 4024 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe 91 PID 4024 wrote to memory of 2508 4024 62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe 91 PID 2508 wrote to memory of 1108 2508 Aqiyq.exe 94 PID 2508 wrote to memory of 1108 2508 Aqiyq.exe 94 PID 2508 wrote to memory of 1108 2508 Aqiyq.exe 94 PID 5056 wrote to memory of 4952 5056 Aqiyq.exe 93 PID 5056 wrote to memory of 4952 5056 Aqiyq.exe 93 PID 5056 wrote to memory of 4952 5056 Aqiyq.exe 93 PID 1108 wrote to memory of 4080 1108 cmd.exe 96 PID 1108 wrote to memory of 4080 1108 cmd.exe 96 PID 1108 wrote to memory of 4080 1108 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe"C:\Users\Admin\AppData\Local\Temp\62adb2037a9e5a3fa1440a513fa42c986538e6c1759864774d4c5025cb303bc3.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\Aqiyq.exeC:\Windows\Aqiyq.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Windows\Aqiyq.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:4080
-
-
-
-
C:\Windows\Aqiyq.exeC:\Windows\Aqiyq.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\Aqiyq.exeC:\Windows\Aqiyq.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD557f032621c3de1a460f209dc5f6a6f11
SHA14e67e3af4a19f4dc4963ac764a0e2037fcbf5f1c
SHA256f15023df6e155ea0d4c25c54d9ed8f84de35dd263d5617328b0e8df2521a62ea
SHA5126a2d2701114a85bd8e8f8851c5e17fce42cb3de6bcd64ffb016cc0cd41f4ebf10143f23dd5f7aaf4ac12456a796a0c7c8988e3391dcef287c87378793ffeb63c
-
Filesize
87KB
MD54e058ba13fdd13b881c7d097ecad6127
SHA1ab62c775aa4c02e611e9f224c9c72613ebe59811
SHA256785d6c2f8dacd375dbcc9e6d1220cf8c483749e636d088d5453ab2ee21e03176
SHA512f8392b2f1636d1ce3c08837a58c1027ad61f079a9b7240d88d26dbe1a7b811cf77982b5170fd098782100ab0d84c9c274ff8a578980fc1ece9acef97c69f6902
-
Filesize
29KB
MD5e18d3a3a3d40f4e5abe196450657904f
SHA101fbb1b2dc55eb2e59901dfb6ab6014efc09c300
SHA256693dc9ed02d0b08efd39a77757ac5e9dfe781f893316ef06c470af1822b20bbe
SHA512fb929e306ec9c7159153a7f8628dd03a886f61a33984dd62ac2952969a4e6d150050900b89f8bf310efef76166832c4ddba702236cc003b4f348f9852b6c6446
-
Filesize
505KB
MD5981e8d229c6bedf67191f2450ac5baf0
SHA1e3180f2e0f53dab7d914ef2f8bdeff2f614048eb
SHA256bcc462a70a45b57a48a85ee6fe1767c7336112f47b556bcd50d708edd03dc48c
SHA512ad56c83c105a18fc97891b2d1f4f09fdc0d0a71e4cfb00b45b6a7ae245c2efc979c3e94400b714e4a47f918e867f008df998167a4eb522010d863007b03f0f07