Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 02:35
Static task
static1
Behavioral task
behavioral1
Sample
a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe
Resource
win7-20231215-en
General
-
Target
a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe
-
Size
2.2MB
-
MD5
6c7e4ce53089162d31b4f2a6aff9e327
-
SHA1
b8738a7dbf227640910fde6a3e2de0a91f3c19c6
-
SHA256
a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114
-
SHA512
904639e800eebfeff43125c8276459f092b7669997b581fa7ba2004a6c67ae4e3e7fc9978d31ceec6f43d8b180870a79c833beae8e0a821a3c70b3a909027b35
-
SSDEEP
24576:P09tv9/7JtDElDEExIko2H2HESq2eWJ6MQjySjy+nAvBj/4ZT:P09XJt4HIN2H2tFvduySux/0
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1572-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1572-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1572-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2356-34-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2776-62-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2776-65-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2776-67-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/1572-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1572-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1572-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2356-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1572-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2356-34-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2776-62-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2776-65-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2776-67-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 3 IoCs
pid Process 1572 RVN.exe 2356 TXPlatforn.exe 2776 TXPlatforn.exe -
Loads dropped DLL 2 IoCs
pid Process 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe 2356 TXPlatforn.exe -
resource yara_rule behavioral1/memory/1572-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1572-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1572-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1572-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2356-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1572-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2356-34-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2776-60-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2776-62-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2776-65-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2776-67-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2632 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2776 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1572 RVN.exe Token: SeLoadDriverPrivilege 2776 TXPlatforn.exe Token: 33 2776 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2776 TXPlatforn.exe Token: 33 2776 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2776 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1572 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe 28 PID 2480 wrote to memory of 1572 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe 28 PID 2480 wrote to memory of 1572 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe 28 PID 2480 wrote to memory of 1572 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe 28 PID 2480 wrote to memory of 1572 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe 28 PID 2480 wrote to memory of 1572 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe 28 PID 2480 wrote to memory of 1572 2480 a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe 28 PID 1572 wrote to memory of 2764 1572 RVN.exe 33 PID 1572 wrote to memory of 2764 1572 RVN.exe 33 PID 1572 wrote to memory of 2764 1572 RVN.exe 33 PID 1572 wrote to memory of 2764 1572 RVN.exe 33 PID 2356 wrote to memory of 2776 2356 TXPlatforn.exe 32 PID 2356 wrote to memory of 2776 2356 TXPlatforn.exe 32 PID 2356 wrote to memory of 2776 2356 TXPlatforn.exe 32 PID 2356 wrote to memory of 2776 2356 TXPlatforn.exe 32 PID 2356 wrote to memory of 2776 2356 TXPlatforn.exe 32 PID 2356 wrote to memory of 2776 2356 TXPlatforn.exe 32 PID 2356 wrote to memory of 2776 2356 TXPlatforn.exe 32 PID 2764 wrote to memory of 2632 2764 cmd.exe 31 PID 2764 wrote to memory of 2632 2764 cmd.exe 31 PID 2764 wrote to memory of 2632 2764 cmd.exe 31 PID 2764 wrote to memory of 2632 2764 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe"C:\Users\Admin\AppData\Local\Temp\a6598622671b78f6b69047d4919b2106ae9af3c9dd4337a3766bc8461f8f7114.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2764
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.11⤵
- Runs ping.exe
PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD599560628d673e01af5001d6bc14fa0e4
SHA1fc7eba6d6f7339647d1d3a8221a27ce5a4927127
SHA2561e899976a236333b535de73b2a2d678d16c64b535e54e0d341cd311ee0051612
SHA512aae0c786eed84269fe272d25ffa967347f955cbc445dd0ddec3b0fb5954d301e3dd6db3935278c4d7541495d32f34d8ebb37f3272ee5240b4e66abe9b65cbc85
-
Filesize
71KB
MD5fb44f7af2882d222b600539171f54c1d
SHA10c5a1a0b1620a55a0f194464227be25a2f0347e1
SHA256f2a78e76259bc8fd4ab6af7b4e16dfb49a10643308aca3d14c09e61ac0ebd487
SHA51221e906473f64303c4c8d55213ccb84f4a803c11fb5eef34ce3194adfb391ccbcc91e7c399556c7a4e4f3d33b9b19524d4499ec771ee8e1a10df26ea7cc2dcb67
-
Filesize
371KB
MD5cd2cba066099f8b68257d5889f541d8e
SHA1e18a874c91c1870d296052cb0ea118201f3e1bae
SHA256071db0adb83203dcaa6a08b492137c010e2f7d492186629b6de182daa1d26375
SHA5120722ca04b832e10987152312b87cc04dd05df983fb79dcf7ce117535299c12050c48b2da24ca21d0d2eaf6c66897e2a3a930d592b3599e76c9b6e24d37a5aba1
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
345KB
MD5164be52bf96cc4f28feceb87b4ff51d6
SHA13a118aee78c1d1237e0ffe74e56e3a18e01c9e7f
SHA25603498f96bb0ed94b03030ff19181153ecb6de1e7d7a43af5b105e97adba89164
SHA5126b82fd420719eeb0598ae6a492841c160548db3f7f4b491bb511081a54432692b397cfc33089c317ed4ea21310cd654094070d2e5b79a5e402e9a91e22054d15