Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2024 12:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe
Resource
win7-20231215-en
windows7-x64
11 signatures
150 seconds
General
-
Target
fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe
-
Size
1.3MB
-
MD5
a6dfa4843f320c6fe7a152a2451648f7
-
SHA1
aa36afef02d3aab8f47a4a99990bc2d78d693b39
-
SHA256
fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb
-
SHA512
9b5587b261762143901c7dd12d80b5d54f478a9350cd68e3b444c34da5f187d8eec4d3a0286cd2be02db2177abda7fc9b0c01d74fccbfcf02dc2a9c03a46e70c
-
SSDEEP
24576:dOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN7:QHPkVOBTK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/960-0-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/380-11-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/3908-18-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/960-0-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/380-11-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/3908-18-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Stumn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Stumn.exe -
Executes dropped EXE 2 IoCs
pid Process 380 Stumn.exe 3908 Stumn.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Stumn.exe fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe File opened for modification C:\Windows\SysWOW64\Stumn.exe fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Stumn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Stumn.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Stumn.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 964 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3908 Stumn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 960 fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe Token: SeLoadDriverPrivilege 3908 Stumn.exe Token: 33 3908 Stumn.exe Token: SeIncBasePriorityPrivilege 3908 Stumn.exe Token: 33 3908 Stumn.exe Token: SeIncBasePriorityPrivilege 3908 Stumn.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 960 wrote to memory of 2012 960 fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe 25 PID 960 wrote to memory of 2012 960 fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe 25 PID 960 wrote to memory of 2012 960 fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe 25 PID 380 wrote to memory of 3908 380 Stumn.exe 23 PID 380 wrote to memory of 3908 380 Stumn.exe 23 PID 380 wrote to memory of 3908 380 Stumn.exe 23 PID 2012 wrote to memory of 964 2012 cmd.exe 22 PID 2012 wrote to memory of 964 2012 cmd.exe 22 PID 2012 wrote to memory of 964 2012 cmd.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe"C:\Users\Admin\AppData\Local\Temp\fdbe037a0b9c236d196552d503e7267ff8b7b704d4d0b05bc1928439986db1cb.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\FDBE03~1.EXE > nul2⤵
- Suspicious use of WriteProcessMemory
PID:2012
-
-
C:\Windows\SysWOW64\Stumn.exeC:\Windows\SysWOW64\Stumn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\Stumn.exeC:\Windows\SysWOW64\Stumn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.11⤵
- Runs ping.exe
PID:964