Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe
Resource
win7-20231215-en
General
-
Target
cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe
-
Size
374KB
-
MD5
6c2c08f590997758a68212c53ffc2f0c
-
SHA1
e6878c8da32a8e4a1f41b0551df980a36f897f42
-
SHA256
cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351
-
SHA512
5153737d6290bb6cff4bb1e237a8d3a20603c7e69eec8af6999092c81f13976d43bcc910ab5c77fa887c7b96182efb065137541235f50d354aa099b97b8502a5
-
SSDEEP
6144:NjO+L1Czkq7KTW1Dl/saQ9rtYm3okqoBSpH50KcddsVRZdaiYviQJqOC5cpQwmB:ZMzpOTY+JzYmE7R55udm7U5JTqwe
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2244-3-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit behavioral2/memory/2244-4-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit behavioral2/memory/2244-16-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit behavioral2/memory/3512-22-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit behavioral2/memory/3512-27-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral2/memory/2244-2-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral2/memory/2244-3-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral2/memory/2244-4-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral2/memory/2244-16-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral2/memory/3512-20-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral2/memory/3512-22-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral2/memory/3512-27-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Jklde.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe -
Executes dropped EXE 1 IoCs
pid Process 3512 Jklde.exe -
resource yara_rule behavioral2/memory/2244-0-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral2/memory/2244-2-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral2/memory/2244-3-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral2/memory/2244-4-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral2/memory/2244-16-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral2/memory/3512-20-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral2/memory/3512-22-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral2/memory/3512-27-0x0000000010000000-0x00000000101A9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 676 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2244 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe Token: 33 3512 Jklde.exe Token: SeIncBasePriorityPrivilege 3512 Jklde.exe Token: 33 3512 Jklde.exe Token: SeIncBasePriorityPrivilege 3512 Jklde.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2244 wrote to memory of 3512 2244 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 91 PID 2244 wrote to memory of 3512 2244 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 91 PID 2244 wrote to memory of 3512 2244 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 91 PID 2244 wrote to memory of 3324 2244 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 92 PID 2244 wrote to memory of 3324 2244 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 92 PID 2244 wrote to memory of 3324 2244 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 92 PID 3324 wrote to memory of 676 3324 cmd.exe 94 PID 3324 wrote to memory of 676 3324 cmd.exe 94 PID 3324 wrote to memory of 676 3324 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe"C:\Users\Admin\AppData\Local\Temp\cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Jklde.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Jklde.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\CF58B2~1.EXE > nul2⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD56c2c08f590997758a68212c53ffc2f0c
SHA1e6878c8da32a8e4a1f41b0551df980a36f897f42
SHA256cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351
SHA5125153737d6290bb6cff4bb1e237a8d3a20603c7e69eec8af6999092c81f13976d43bcc910ab5c77fa887c7b96182efb065137541235f50d354aa099b97b8502a5