Analysis
-
max time kernel
0s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:30
Behavioral task
behavioral1
Sample
dab7b1931e1fd1d7446465e67e06596969a613e81a598c895a847e9a80b98ce7.exe
Resource
win7-20231215-en
15 signatures
150 seconds
General
-
Target
dab7b1931e1fd1d7446465e67e06596969a613e81a598c895a847e9a80b98ce7.exe
-
Size
628KB
-
MD5
342cbc79e5daf07179604321dbfbb456
-
SHA1
73734b1523d83d61b9883b797476d4a164f7cb07
-
SHA256
dab7b1931e1fd1d7446465e67e06596969a613e81a598c895a847e9a80b98ce7
-
SHA512
28a3fb2e249340b171575c978f8dad622277cefdfedccf6d1b51b0923198e3a1a3461f155c5c6862673c39fa0737d3f2cd22ba7a3a8ed36971d359f280153126
-
SSDEEP
12288:WhymnwJFPNdgBAEHApqePJN1AmLM7uVq9sS0yun4txyzF:WUmwrl2Ao7sJNlM7ymsS0Zn4txyzF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1432-37-0x0000000000400000-0x0000000000564000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1432-37-0x0000000000400000-0x0000000000564000-memory.dmp family_gh0strat -
resource yara_rule behavioral2/memory/1432-37-0x0000000000400000-0x0000000000564000-memory.dmp upx -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 900 PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\dab7b1931e1fd1d7446465e67e06596969a613e81a598c895a847e9a80b98ce7.exe"C:\Users\Admin\AppData\Local\Temp\dab7b1931e1fd1d7446465e67e06596969a613e81a598c895a847e9a80b98ce7.exe"1⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\DAB7B1~1.EXE > nul2⤵PID:2800
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.11⤵
- Runs ping.exe
PID:900
-
C:\Windows\SysWOW64\Sys.exeC:\Windows\SysWOW64\Sys.exe -acsi1⤵PID:1432
-
C:\Windows\SysWOW64\Sys.exeC:\Windows\SysWOW64\Sys.exe -auto1⤵PID:2004