Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe
Resource
win7-20231129-en
windows7-x64
14 signatures
150 seconds
General
-
Target
bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe
-
Size
1.3MB
-
MD5
d532501fa9d65ad35bcdd658c9f757f7
-
SHA1
9310d9588de5d5fd60e5dcb4c467bc8e3626be0f
-
SHA256
bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c
-
SHA512
f8893df293114881a453a2001021b53c5a58c56461668bda2c9a687c795f410657892adf1408c5a80e92acdfe8b7dd0ea17153b623a37da3c8f2b3267bb7b652
-
SSDEEP
24576:kOyHutimZ9VSly2hVvHW6qMnSbTBBhBMNQiyzwyzo:VHPkVOBTKV
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1216-0-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral1/memory/2780-18-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1216-0-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral1/memory/2780-18-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys sainbox.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" sainbox.exe -
Deletes itself 1 IoCs
pid Process 3068 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2196 sainbox.exe 2780 sainbox.exe -
Loads dropped DLL 1 IoCs
pid Process 2196 sainbox.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sainbox.exe bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe File opened for modification C:\Windows\SysWOW64\sainbox.exe bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2644 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2780 sainbox.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1216 bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe Token: SeLoadDriverPrivilege 2780 sainbox.exe Token: 33 2780 sainbox.exe Token: SeIncBasePriorityPrivilege 2780 sainbox.exe Token: 33 2780 sainbox.exe Token: SeIncBasePriorityPrivilege 2780 sainbox.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1216 wrote to memory of 3068 1216 bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe 22 PID 1216 wrote to memory of 3068 1216 bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe 22 PID 1216 wrote to memory of 3068 1216 bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe 22 PID 1216 wrote to memory of 3068 1216 bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe 22 PID 2196 wrote to memory of 2780 2196 sainbox.exe 19 PID 2196 wrote to memory of 2780 2196 sainbox.exe 19 PID 2196 wrote to memory of 2780 2196 sainbox.exe 19 PID 2196 wrote to memory of 2780 2196 sainbox.exe 19 PID 3068 wrote to memory of 2644 3068 cmd.exe 20 PID 3068 wrote to memory of 2644 3068 cmd.exe 20 PID 3068 wrote to memory of 2644 3068 cmd.exe 20 PID 3068 wrote to memory of 2644 3068 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe"C:\Users\Admin\AppData\Local\Temp\bde34a97d2f58f4ef1f54973ff68d1757e04f4704b7af9b9894f3005d47d598c.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\BDE34A~1.EXE > nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:3068
-
-
C:\Windows\SysWOW64\sainbox.exeC:\Windows\SysWOW64\sainbox.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\sainbox.exeC:\Windows\SysWOW64\sainbox.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.11⤵
- Runs ping.exe
PID:2644