Analysis
-
max time kernel
166s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe
Resource
win7-20240221-en
General
-
Target
c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe
-
Size
1.3MB
-
MD5
3ee175a871360d6f6f5cec278e454eed
-
SHA1
bab1d5d1beff85251c0b7efc37e8ee46014e6a06
-
SHA256
c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc
-
SHA512
14f11cf9af75ba6e4dd322ca763848d7a68ed2afca1271c593c74b5630a0f9777c8882943364011958db54da67b16669310b6a1e903ef2952e3130910bfc6fd4
-
SSDEEP
24576:vOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN9:iHPkVOBTK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1968-0-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/3184-10-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/4812-17-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/1968-0-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/3184-10-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/4812-17-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Aqiyq.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Aqiyq.exe -
Executes dropped EXE 2 IoCs
pid Process 3184 Aqiyq.exe 4812 Aqiyq.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Aqiyq.exe c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe File opened for modification C:\Windows\SysWOW64\Aqiyq.exe c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2100 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4812 Aqiyq.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1968 c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe Token: SeLoadDriverPrivilege 4812 Aqiyq.exe Token: 33 4812 Aqiyq.exe Token: SeIncBasePriorityPrivilege 4812 Aqiyq.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1968 wrote to memory of 5104 1968 c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe 103 PID 1968 wrote to memory of 5104 1968 c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe 103 PID 1968 wrote to memory of 5104 1968 c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe 103 PID 5104 wrote to memory of 2100 5104 cmd.exe 105 PID 5104 wrote to memory of 2100 5104 cmd.exe 105 PID 5104 wrote to memory of 2100 5104 cmd.exe 105 PID 3184 wrote to memory of 4812 3184 Aqiyq.exe 106 PID 3184 wrote to memory of 4812 3184 Aqiyq.exe 106 PID 3184 wrote to memory of 4812 3184 Aqiyq.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe"C:\Users\Admin\AppData\Local\Temp\c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\C1F247~1.EXE > nul2⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:2100
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵PID:884
-
C:\Windows\SysWOW64\Aqiyq.exeC:\Windows\SysWOW64\Aqiyq.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\Aqiyq.exeC:\Windows\SysWOW64\Aqiyq.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53ee175a871360d6f6f5cec278e454eed
SHA1bab1d5d1beff85251c0b7efc37e8ee46014e6a06
SHA256c1f2472859dfd2c1b288ae8444a393a881acd30beca90f3b26b7eaf1397724fc
SHA51214f11cf9af75ba6e4dd322ca763848d7a68ed2afca1271c593c74b5630a0f9777c8882943364011958db54da67b16669310b6a1e903ef2952e3130910bfc6fd4