Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe
Resource
win7-20240221-en
General
-
Target
c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe
-
Size
1.3MB
-
MD5
3ee175a871360d6f6f5cec278e454eed
-
SHA1
bab1d5d1beff85251c0b7efc37e8ee46014e6a06
-
SHA256
c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc
-
SHA512
14f11cf9af75ba6e4dd322ca763848d7a68ed2afca1271c593c74b5630a0f9777c8882943364011958db54da67b16669310b6a1e903ef2952e3130910bfc6fd4
-
SSDEEP
24576:vOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN9:iHPkVOBTK
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1544-0-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1544-0-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Aqiyq.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Aqiyq.exe -
Deletes itself 1 IoCs
pid Process 2852 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1956 Aqiyq.exe 2500 Aqiyq.exe -
Loads dropped DLL 1 IoCs
pid Process 1956 Aqiyq.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Aqiyq.exe c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe File opened for modification C:\Windows\SysWOW64\Aqiyq.exe c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2372 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2500 Aqiyq.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1544 c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe Token: SeLoadDriverPrivilege 2500 Aqiyq.exe Token: 33 2500 Aqiyq.exe Token: SeIncBasePriorityPrivilege 2500 Aqiyq.exe Token: 33 2500 Aqiyq.exe Token: SeIncBasePriorityPrivilege 2500 Aqiyq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2500 1956 Aqiyq.exe 30 PID 1956 wrote to memory of 2500 1956 Aqiyq.exe 30 PID 1956 wrote to memory of 2500 1956 Aqiyq.exe 30 PID 1956 wrote to memory of 2500 1956 Aqiyq.exe 30 PID 1544 wrote to memory of 2852 1544 c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe 29 PID 1544 wrote to memory of 2852 1544 c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe 29 PID 1544 wrote to memory of 2852 1544 c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe 29 PID 1544 wrote to memory of 2852 1544 c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe 29 PID 2852 wrote to memory of 2372 2852 cmd.exe 32 PID 2852 wrote to memory of 2372 2852 cmd.exe 32 PID 2852 wrote to memory of 2372 2852 cmd.exe 32 PID 2852 wrote to memory of 2372 2852 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe"C:\Users\Admin\AppData\Local\Temp\c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\C1F247~1.EXE > nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:2372
-
-
-
C:\Windows\SysWOW64\Aqiyq.exeC:\Windows\SysWOW64\Aqiyq.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\Aqiyq.exeC:\Windows\SysWOW64\Aqiyq.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53ee175a871360d6f6f5cec278e454eed
SHA1bab1d5d1beff85251c0b7efc37e8ee46014e6a06
SHA256c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc
SHA51214f11cf9af75ba6e4dd322ca763848d7a68ed2afca1271c593c74b5630a0f9777c8882943364011958db54da67b16669310b6a1e903ef2952e3130910bfc6fd4
-
Filesize
573KB
MD59dd6fad205248609c48bb06b6a3f74a9
SHA1da96133de612658381aae7ce2980de4250252bae
SHA256079b5395ff2ded1686fcec364179c68e786eb729bda185c6f68c400c6caecf22
SHA5121bfc916d095541e19c27474e82280bbbe7f2fbcbfb34874abfe523b6f173bb31b3252d0e971d3ac55c8099f3da876ecc39bc11b9d675ed6b80a8b49b1dd83b85