Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-04-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
mngboot.exe
Resource
win7-20240221-en
General
-
Target
mngboot.exe
-
Size
2.0MB
-
MD5
2a5f4c6d957f37ecea115fffe6d28467
-
SHA1
9fe8436f8e1f6198b883404f0b59256b4f08bbed
-
SHA256
5058d869c59bfb3480d1dc6f8f51d191adb890039c89ff9fd668fe7b481099b8
-
SHA512
673861e0bb2c2a4a26a9ab0a34fee45aa48e26b0677fb1815c9cc79fb1520d81c75d63d27af69e7229d79823022c5ca78ab4b7dd0d74388e84a93ef789a04ba8
-
SSDEEP
49152:aVhyh5fVd/kOz40n4OdaVZsNz/Trp/HfaBa4kRQaddfZL17N:LY4rn4OdYiH9Qa/RLz
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2972-8693-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral1/memory/2972-16450-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral1/memory/1888-17400-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral1/memory/2972-17410-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral1/memory/1888-17414-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral1/memory/1888-17411-0x0000000001BE0000-0x0000000001F12000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2972-8693-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral1/memory/2972-16450-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral1/memory/1888-17400-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral1/memory/2972-17410-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral1/memory/1888-17414-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral1/memory/1888-17411-0x0000000001BE0000-0x0000000001F12000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1924 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
Dtldt.exeDtldt.exepid process 1888 Dtldt.exe 2248 Dtldt.exe -
Loads dropped DLL 1 IoCs
Processes:
Dtldt.exepid process 1888 Dtldt.exe -
Drops file in System32 directory 2 IoCs
Processes:
mngboot.exedescription ioc process File created C:\Windows\SysWOW64\Dtldt.exe mngboot.exe File opened for modification C:\Windows\SysWOW64\Dtldt.exe mngboot.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
mngboot.exeDtldt.exepid process 2972 mngboot.exe 2972 mngboot.exe 2972 mngboot.exe 2972 mngboot.exe 2972 mngboot.exe 2972 mngboot.exe 1888 Dtldt.exe 2972 mngboot.exe 1888 Dtldt.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
mngboot.exedescription pid process Token: SeIncBasePriorityPrivilege 2972 mngboot.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
mngboot.exeDtldt.execmd.exedescription pid process target process PID 2972 wrote to memory of 1924 2972 mngboot.exe cmd.exe PID 2972 wrote to memory of 1924 2972 mngboot.exe cmd.exe PID 2972 wrote to memory of 1924 2972 mngboot.exe cmd.exe PID 2972 wrote to memory of 1924 2972 mngboot.exe cmd.exe PID 1888 wrote to memory of 2248 1888 Dtldt.exe Dtldt.exe PID 1888 wrote to memory of 2248 1888 Dtldt.exe Dtldt.exe PID 1888 wrote to memory of 2248 1888 Dtldt.exe Dtldt.exe PID 1888 wrote to memory of 2248 1888 Dtldt.exe Dtldt.exe PID 1888 wrote to memory of 2248 1888 Dtldt.exe Dtldt.exe PID 1888 wrote to memory of 2248 1888 Dtldt.exe Dtldt.exe PID 1888 wrote to memory of 2248 1888 Dtldt.exe Dtldt.exe PID 1924 wrote to memory of 2072 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 2072 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 2072 1924 cmd.exe PING.EXE PID 1924 wrote to memory of 2072 1924 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\mngboot.exe"C:\Users\Admin\AppData\Local\Temp\mngboot.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\mngboot.exe > nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:2072
-
-
-
C:\Windows\SysWOW64\Dtldt.exeC:\Windows\SysWOW64\Dtldt.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\Dtldt.exeC:\Windows\SysWOW64\Dtldt.exe -acsi2⤵
- Executes dropped EXE
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD52a5f4c6d957f37ecea115fffe6d28467
SHA19fe8436f8e1f6198b883404f0b59256b4f08bbed
SHA2565058d869c59bfb3480d1dc6f8f51d191adb890039c89ff9fd668fe7b481099b8
SHA512673861e0bb2c2a4a26a9ab0a34fee45aa48e26b0677fb1815c9cc79fb1520d81c75d63d27af69e7229d79823022c5ca78ab4b7dd0d74388e84a93ef789a04ba8