Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 11:43
Behavioral task
behavioral1
Sample
8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe
Resource
win7-20231215-en
General
-
Target
8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe
-
Size
539KB
-
MD5
f2d86e6703e7706174e887936571d7d4
-
SHA1
1f2377bd479e7fe584cbab253b29b37d4f767b36
-
SHA256
8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825
-
SHA512
9d7bdf72a52c4041469c9380d9a7d8c29d21a05e64710547c2d542991a1356a7c10cc4a429d753e772b571fb884b5687b70b3eb94ee7ceb403df30f13f73341e
-
SSDEEP
12288:NhymnwJFPNdgBAEHApqePJN1AmLM7uVq9sSAL:NUmwrl2Ao7sJNlM7ymsSA
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4312-1-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/1600-12-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/1600-23-0x0000000000400000-0x0000000000547000-memory.dmp purplefox_rootkit behavioral2/memory/2440-20-0x0000000000400000-0x0000000000547000-memory.dmp purplefox_rootkit behavioral2/memory/4312-19-0x0000000000400000-0x0000000000547000-memory.dmp purplefox_rootkit behavioral2/memory/2440-37-0x0000000000400000-0x0000000000547000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral2/memory/4312-1-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/1600-11-0x0000000000400000-0x0000000000547000-memory.dmp family_gh0strat behavioral2/memory/1600-12-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/1600-23-0x0000000000400000-0x0000000000547000-memory.dmp family_gh0strat behavioral2/memory/2440-20-0x0000000000400000-0x0000000000547000-memory.dmp family_gh0strat behavioral2/memory/4312-19-0x0000000000400000-0x0000000000547000-memory.dmp family_gh0strat behavioral2/memory/2440-37-0x0000000000400000-0x0000000000547000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Wxypq.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Wxypq.exe -
Executes dropped EXE 2 IoCs
pid Process 1600 Wxypq.exe 2440 Wxypq.exe -
resource yara_rule behavioral2/memory/4312-0-0x0000000000400000-0x0000000000547000-memory.dmp upx behavioral2/memory/1600-11-0x0000000000400000-0x0000000000547000-memory.dmp upx behavioral2/files/0x0008000000023208-10.dat upx behavioral2/files/0x0008000000023208-9.dat upx behavioral2/files/0x0008000000023208-18.dat upx behavioral2/memory/1600-23-0x0000000000400000-0x0000000000547000-memory.dmp upx behavioral2/memory/2440-20-0x0000000000400000-0x0000000000547000-memory.dmp upx behavioral2/memory/4312-19-0x0000000000400000-0x0000000000547000-memory.dmp upx behavioral2/memory/2440-37-0x0000000000400000-0x0000000000547000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\AppPatch\Wxypq.exe 8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe File created C:\Program Files (x86)\AppPatch\Wxypq.exe 8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Wxypq.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Wxypq.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Wxypq.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 920 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2440 Wxypq.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4312 8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe Token: SeLoadDriverPrivilege 2440 Wxypq.exe Token: 33 2440 Wxypq.exe Token: SeIncBasePriorityPrivilege 2440 Wxypq.exe Token: 33 2440 Wxypq.exe Token: SeIncBasePriorityPrivilege 2440 Wxypq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4312 wrote to memory of 1236 4312 8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe 88 PID 4312 wrote to memory of 1236 4312 8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe 88 PID 4312 wrote to memory of 1236 4312 8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe 88 PID 1600 wrote to memory of 2440 1600 Wxypq.exe 89 PID 1600 wrote to memory of 2440 1600 Wxypq.exe 89 PID 1600 wrote to memory of 2440 1600 Wxypq.exe 89 PID 1236 wrote to memory of 920 1236 cmd.exe 92 PID 1236 wrote to memory of 920 1236 cmd.exe 92 PID 1236 wrote to memory of 920 1236 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe"C:\Users\Admin\AppData\Local\Temp\8c385106f2acdb5958abc3b808e540d162fe9c8f4a7d3c35f2f03bdde5c52825.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\8C3851~1.EXE > nul2⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:920
-
-
-
C:\Program Files (x86)\AppPatch\Wxypq.exe"C:\Program Files (x86)\AppPatch\Wxypq.exe" -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Program Files (x86)\AppPatch\Wxypq.exe"C:\Program Files (x86)\AppPatch\Wxypq.exe" -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD59a4a53d57280dc0326ab984ea1f76dfe
SHA148f931a922b0925542985c7e3148707eb60c3663
SHA2569233356e68091b391c3f4b7ff279242ef2cf00afe670f97ad0f2e2d39e348267
SHA5129c2ee4ee9fe842c70f6b975d294a64a7a845771acad969ffe260855b888520176dd7dfba224f122d1c61916f74826b5c34e8cc75070b603e53c206cbb261e594
-
Filesize
62KB
MD5ad650fe8374001cc958df041bd4aa174
SHA13279fe9bfa6ae09c07da943a12e8615550a3b95f
SHA2569cc7914e2071697c14fd34b9acf1df3ea09099c8ab6428b65b83b08abed0d027
SHA512eb7a2893a815a763b178ae9d638483e5e1774cc167966536795e6ed5c17bc89ed172dfd8c288aefd46fd7b1a0b3eac8d8a39c518fafb6a99edeaf8b2f57ffa6a
-
Filesize
196KB
MD5470406165bb0aa92d11f3985142ca90d
SHA1ebbecf694fb7e15ef86a110ef7c324fe843710e7
SHA256c9a4abe535de62ca877e4a8374a61de3a435cc57273ed7ef181ca0e1535f1e28
SHA512101e48340a736670a089b32b13e5ec8ce007bb3d8f773b1667102d468039ea003151dbfcd1741525f3be4fecb37a01e119d4fbdea069c5d4ce526d55f6d98eb4