Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe
Resource
win7-20231215-en
General
-
Target
19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe
-
Size
2.7MB
-
MD5
3ad1c9b351cf402836e4512afeb56a71
-
SHA1
5001db6ea8468270101dd2c2c87bcbe678bade47
-
SHA256
19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb
-
SHA512
652855f9543c13120d43e5739d262baaddcb0ca82ea15001e3ac49849baddd3ac46a10783d71815f0ae3220ff804ee472623e9a78a4af4932e3577180a684315
-
SSDEEP
24576:QCwsbKgbQ5NANIvGTYwMHXA+wT1kfTw4SIuvB74fgt7ibhRM5QhKehFdMtRj7nHJ:QCwsbCANnKXferL7Vwe/Gg0P+Whm1gMl
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2748-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2748-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2668-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2904-41-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2904-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2904-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2904-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2748-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
resource yara_rule behavioral1/memory/2748-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2748-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2668-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2904-41-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2904-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2904-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2904-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2748-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/files/0x000d000000012321-9.dat family_gh0strat behavioral1/files/0x000d000000012321-8.dat family_gh0strat behavioral1/files/0x000d000000012321-6.dat family_gh0strat behavioral1/files/0x000d000000012321-52.dat family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\259394188.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 5 IoCs
pid Process 2472 R.exe 2748 N.exe 2668 TXPlatfor.exe 2904 TXPlatfor.exe 1064 Remote Data.exe -
Loads dropped DLL 7 IoCs
pid Process 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 2472 R.exe 2308 svchost.exe 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 2668 TXPlatfor.exe 2308 svchost.exe 1064 Remote Data.exe -
resource yara_rule behavioral1/memory/2748-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2748-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2668-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2904-41-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2904-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2904-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2904-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2748-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2748-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\259394188.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2556 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2904 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2748 N.exe Token: SeLoadDriverPrivilege 2904 TXPlatfor.exe Token: 33 2904 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2904 TXPlatfor.exe Token: 33 2904 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2904 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2472 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 25 PID 3052 wrote to memory of 2472 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 25 PID 3052 wrote to memory of 2472 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 25 PID 3052 wrote to memory of 2472 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 25 PID 3052 wrote to memory of 2748 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 23 PID 3052 wrote to memory of 2748 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 23 PID 3052 wrote to memory of 2748 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 23 PID 3052 wrote to memory of 2748 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 23 PID 3052 wrote to memory of 2748 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 23 PID 3052 wrote to memory of 2748 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 23 PID 3052 wrote to memory of 2748 3052 19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe 23 PID 2748 wrote to memory of 2804 2748 N.exe 22 PID 2748 wrote to memory of 2804 2748 N.exe 22 PID 2748 wrote to memory of 2804 2748 N.exe 22 PID 2748 wrote to memory of 2804 2748 N.exe 22 PID 2668 wrote to memory of 2904 2668 TXPlatfor.exe 21 PID 2668 wrote to memory of 2904 2668 TXPlatfor.exe 21 PID 2668 wrote to memory of 2904 2668 TXPlatfor.exe 21 PID 2668 wrote to memory of 2904 2668 TXPlatfor.exe 21 PID 2668 wrote to memory of 2904 2668 TXPlatfor.exe 21 PID 2668 wrote to memory of 2904 2668 TXPlatfor.exe 21 PID 2668 wrote to memory of 2904 2668 TXPlatfor.exe 21 PID 2804 wrote to memory of 2556 2804 cmd.exe 19 PID 2804 wrote to memory of 2556 2804 cmd.exe 19 PID 2804 wrote to memory of 2556 2804 cmd.exe 19 PID 2804 wrote to memory of 2556 2804 cmd.exe 19 PID 2308 wrote to memory of 1064 2308 svchost.exe 38 PID 2308 wrote to memory of 1064 2308 svchost.exe 38 PID 2308 wrote to memory of 1064 2308 svchost.exe 38 PID 2308 wrote to memory of 1064 2308 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe"C:\Users\Admin\AppData\Local\Temp\19b6099de4bbf8b2da37723f682728a99b8b5d347fcc002dc0bdc408764a53fb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2472
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:2072
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.11⤵
- Runs ping.exe
PID:2556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul1⤵
- Suspicious use of WriteProcessMemory
PID:2804
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\259394188.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
319KB
MD568c930fe0dc06db350eadd92006d74ed
SHA1e7d5488fe6fb7c49f3e94d679a9289b6fee6e31a
SHA256962ab1d477180a4a5ba5abeea24ad0f40f79a9ba9e317609eef15b306f3ee470
SHA51206555a1699d0c3cfcff838b2d6a50ae6f1007f1d6a640de74509e243c97060731fe3221b2eb210c45c457e901330588a81a8d5061e1949a4212ab2ca026bcced
-
Filesize
33KB
MD5c0346c4cdd8a65b80411217d27e589fc
SHA13f703058675af5971fada8ec8bee9a3c546132a8
SHA2567d4d740705fb8bdaa5cf45c0b09b4648c61b60fb3f082a8ce5b88eb633fa1de7
SHA512f60f451b39019efe978d61c3f92ef191da6ecc1b246d9bb7090c9146f2a5a298f5b179d72bfbf7fb925bf2f5f19b1984e963777c875c295bbde0186a0b25686a
-
Filesize
62KB
MD501601c2c04797b79224b42fad7821a6b
SHA1c9442d52dc305a23fb4d7bfdc5c2497fa28a541f
SHA2563a4209aca3f3a710ea00c22b7002f0ae136de0804cd288e0b8b8e7dc92467909
SHA512c5ba8ae1c82fb7bb913d0e3f5f8e719053b1ac35146d82038e58129e353ea49cee9a69136bea31e22dfa5c689ede8b12a54781f032c562be7b74e5a74b93c1ba
-
Filesize
21KB
MD52c45ed10b4647fa81561af0b51b53113
SHA1b91c4cde8a85f11e6ec3841ff69c7b28d655b392
SHA2569576d47970b9a5d09867e789175b42786ae869b6e1f2e1db2dc1a457f6fec7d5
SHA5122fbff956a5876caf40ef871a8fd3c809b2bc41373b785d6ea7924415b733f0f9d596c136c85830a46dbca1156fbabd10db49ab6b75aaeec54e1978cf419bc07c
-
Filesize
32KB
MD5eaae2a85ff5bdc15f81fe9f0675d4c29
SHA1471c3c2e766ce2d4c7c45af5e377247e6424e25d
SHA2565d7eea278b7af53af1129682db8e1e7d3074e0720d5463fca57de4a7bc0e09c9
SHA5124cac4c4d80ecb3af8d1f135de4fb5fcc1450162c9c8d322aef4b2c64d7e8dc7d7947c8e59929c0c715d4a923212583ef34a438c8e4c09421db96c5816207a5a8
-
Filesize
33KB
MD541080ccf504aa84c787c5e35cf4a0df6
SHA1dd12305677c9c8aa3c386dcf0c7ada94e0374ec6
SHA256e9059d5977615c3eb5f20f52cbe199a57c20f82357317db90f919c31227a8abf
SHA512a7960b99e3fedf9239d8e703cc59e38b8129211e75e090cf4993988f4f654b7c545009498759b4ff43367512454718c6cb5acd2993a5f66e21e1e6fe6418c96d
-
Filesize
20KB
MD585f3ef6768a2d484f790b7238c02c181
SHA14c3979914a6d7afe68e2df2da7127c014817f058
SHA256fb434a21b502d33719d1a46e4044a40bc2524ccde4a591d8cf8b4196e5e01cdb
SHA512763d3cd736d11fdcddb38358ae70d500460d26c2ba501648188ae93ff4a1ce2cec6c4f6aaccba225e7782803504c79e20aaf41b9a0b0f6906dad4480144661c4
-
Filesize
5KB
MD571657d687ca515ab1b42d9995127b5a9
SHA1f219ccd1abab3b1d3e01db9e376b828277ed95ed
SHA256d807f97c96166b13dce003768bf2bcf06cd51b0e5de679e5848d59a1eb1e7808
SHA5122f5479dc2f85ecf00f53e9febae25353e785b45e8bc3e9aa474b393d7782c4fc5b99481a82c505600b3a1caae6a83920b072320b57d8f99e3edac617cb86d2ea
-
Filesize
1KB
MD51d154cde763e34c3f47dcd57ca3c85a1
SHA1e210ce378aa42320629558480b2e6e8839166424
SHA256cc1c1fc6773f9268327b7c7a6a3ac14242bde414deeae812ba03b7a18db53126
SHA5124e0836020017a7435370f50154aeed24e3fbf9bfea220434d5dfafd4963915bcd05c2bf1500f26d08890fdc6ee31e4a3deb316d24229f4a7738b364237c9e73b
-
Filesize
26KB
MD539a7d44bae846d5d6f19a082a87f2770
SHA1c6ab2f6ab1b40bfa7974ce3a90e465955c78c45b
SHA25679d6411e4fe506fb93428824ecbea562704254e7058e39a9213839dd35a9844c
SHA512ad02aa9f93a8633aaf323e14fc2bac3f6f49e0017f72d5ae1ff5b1c9b10f96f15cd78a919c47078ab3cbc720dce334f671fc955f1871c6267f0fcec0577e6a7b
-
Filesize
5KB
MD5c5b101135a0f2bdc477fe820a8a03ad5
SHA19f72179350cc634589b41098f6db381ae7a9494d
SHA256f9e823763a6abb4d7d7a9883a5ce77f71891a07aa704aff95cf16b07c5bd74a4
SHA51217df7359afe460acefe312f6d17e4ee5386629c1ce9fc674e30c86bf8df1193e63e6a6b3fe11641c488d2a9e73feab0436d426d9a1150b8779840f12b159d997
-
Filesize
1KB
MD5bf123aaa27c21ba519bc707f92cb7abe
SHA143aefc882c2fae5b31bbd47ca923c86da010e38f
SHA256fa41729572d2f7a2bc7a4b5e72145b39d9bad13b3485be085f06acfd773fce49
SHA5126a8c11ed6e76d80a4421242fb90e84dd7f31e900e9e02b4297fd52d5f826548b535029da4b92ca246d968060fbd90f045f389a29c2dbe26cf6cc2442cbea0550
-
Filesize
5KB
MD5bf3244d01d5b29bb3e7a9160de6acada
SHA16dd6f143be98f9e500a04868d4749042247ca06c
SHA2569608801b116337df060e5b31dadb2b8a5ebd32f963ecfd3dcff87bc104c7088f
SHA51294312c116916c5007446fbbd244c4b0898a2cdd5b631313fc41b09caf04f7ce6cc80848da15da0806428183ff28d067a20f40de18c74fb0a43747b3c5e7af41f
-
Filesize
33KB
MD5de9763efb422b2a10bf0435a726aae8e
SHA1ed5af4a3196a5ab7d5828acf77f0a704d6cd03fb
SHA256044574862db51ddd525f346a5cc595fe095bbf5b1bf8ad18a113c21526c1f827
SHA5120ac88e0e188696e87a208d69ddbaa00b82be94907151371d9869a0716db54cf849e4b1014b8195344d0316655ae2886a5a7af951d9888752e2d06e95f3fb3489
-
Filesize
2KB
MD5d7dd836d68a1c0fb4051a95dfd985005
SHA1639d1317a18445616131eaaa48a2762c3917895a
SHA2567d1e40942870f956189dce8e325b2bc08994c67beb2b03ae3f5b90e5811c9555
SHA512e5978a48693687b712e3d7bb4498eaa0451e644802b6dae8bc013d6078fea067bcebdffeb29d0b0cd1ec2952f45955f2be822f3ff5a2ed346ab50752981074d7