Overview
overview
10Static
static
10IFProtects...ts.exe
windows7-x64
6IFProtects...ts.exe
windows10-2004-x64
1IFProtects...s2.exe
windows7-x64
1IFProtects...s2.exe
windows10-2004-x64
6IFProtects...ut.exe
windows7-x64
3IFProtects...ut.exe
windows10-2004-x64
3active/WebUnion.exe
windows7-x64
1active/WebUnion.exe
windows10-2004-x64
6d86645adc1...sm.exe
windows7-x64
1d86645adc1...sm.exe
windows10-2004-x64
10d86645adc1...df.lnk
windows7-x64
3d86645adc1...df.lnk
windows10-2004-x64
10fgyjk/03F7...BF.exe
windows7-x64
6fgyjk/03F7...BF.exe
windows10-2004-x64
6wyanoc/Agghosts.exe
windows7-x64
10wyanoc/Agghosts.exe
windows10-2004-x64
10xiuxiu-/we...ss.exe
windows7-x64
10xiuxiu-/we...ss.exe
windows10-2004-x64
10Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 02:42
Behavioral task
behavioral1
Sample
IFProtects/Protects/AAProtects.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
IFProtects/Protects/AAProtects.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
IFProtects/Protects/AAProtects2.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
IFProtects/Protects/AAProtects2.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
IFProtects/lWAbout/IWAbout.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
IFProtects/lWAbout/IWAbout.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
active/WebUnion.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
active/WebUnion.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Dism.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Dism.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Document.pdf.lnk
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
d86645adc1cdc9e4ad55f0bb801525e5f08a4c52efbf8043ad4fffcfaa311cef/Document.pdf.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
fgyjk/03F76412C9334BF.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
fgyjk/03F76412C9334BF.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
wyanoc/Agghosts.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
wyanoc/Agghosts.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral17
Sample
xiuxiu-/webprocess.exe
Resource
win7-20231215-en
General
-
Target
xiuxiu-/webprocess.exe
-
Size
387KB
-
MD5
6b4b0bed018f38d6382a97619747b60c
-
SHA1
4461639fe9886ab62327241dcc49f6066dffc852
-
SHA256
1c304154bcd3da78c896e221694fc861eee4cb61f964e927f518769eed48855e
-
SHA512
a1c5fb83ec423d6b98591f820b190204a8ee6f0cbb5be1b71a6dafcc201d4835b0cf82c059d22dde6c49f28ecc4fce0c33c83f5a8b93306b87388e22a1dcc2d3
-
SSDEEP
12288:nzWbxI9aG3CYJ2Tos2uhpWcvD1RRWpD6h:nzT9aGyYQTnz7JuDa
Malware Config
Signatures
-
resource yara_rule behavioral18/memory/4052-0-0x0000000002FD0000-0x0000000003169000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral18/memory/4052-0-0x0000000002FD0000-0x0000000003169000-memory.dmp family_gh0strat -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: webprocess.exe File opened (read-only) \??\R: webprocess.exe File opened (read-only) \??\U: webprocess.exe File opened (read-only) \??\G: webprocess.exe File opened (read-only) \??\H: webprocess.exe File opened (read-only) \??\N: webprocess.exe File opened (read-only) \??\S: webprocess.exe File opened (read-only) \??\W: webprocess.exe File opened (read-only) \??\Y: webprocess.exe File opened (read-only) \??\B: webprocess.exe File opened (read-only) \??\E: webprocess.exe File opened (read-only) \??\O: webprocess.exe File opened (read-only) \??\Q: webprocess.exe File opened (read-only) \??\T: webprocess.exe File opened (read-only) \??\V: webprocess.exe File opened (read-only) \??\X: webprocess.exe File opened (read-only) \??\K: webprocess.exe File opened (read-only) \??\L: webprocess.exe File opened (read-only) \??\P: webprocess.exe File opened (read-only) \??\Z: webprocess.exe File opened (read-only) \??\I: webprocess.exe File opened (read-only) \??\J: webprocess.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 webprocess.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz webprocess.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe 4052 webprocess.exe