Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
mngboot.exe
Resource
win7-20240221-en
General
-
Target
mngboot.exe
-
Size
2.0MB
-
MD5
2a5f4c6d957f37ecea115fffe6d28467
-
SHA1
9fe8436f8e1f6198b883404f0b59256b4f08bbed
-
SHA256
5058d869c59bfb3480d1dc6f8f51d191adb890039c89ff9fd668fe7b481099b8
-
SHA512
673861e0bb2c2a4a26a9ab0a34fee45aa48e26b0677fb1815c9cc79fb1520d81c75d63d27af69e7229d79823022c5ca78ab4b7dd0d74388e84a93ef789a04ba8
-
SSDEEP
49152:aVhyh5fVd/kOz40n4OdaVZsNz/Trp/HfaBa4kRQaddfZL17N:LY4rn4OdYiH9Qa/RLz
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1468-13075-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral2/memory/1468-13076-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/1468-17543-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral2/memory/4960-26161-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral2/memory/4960-26171-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral2/memory/1468-26169-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral2/memory/4196-39246-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit behavioral2/memory/4196-39263-0x0000000000400000-0x0000000000732000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/1468-13075-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral2/memory/1468-13076-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/1468-17543-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral2/memory/4960-26161-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral2/memory/4960-26171-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral2/memory/1468-26169-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral2/memory/4196-39246-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat behavioral2/memory/4196-39263-0x0000000000400000-0x0000000000732000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
Dtldt.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys Dtldt.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
Dtldt.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Dtldt.exe -
Executes dropped EXE 2 IoCs
Processes:
Dtldt.exeDtldt.exepid process 4960 Dtldt.exe 4196 Dtldt.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Dtldt.exedescription ioc process File opened (read-only) \??\S: Dtldt.exe File opened (read-only) \??\V: Dtldt.exe File opened (read-only) \??\W: Dtldt.exe File opened (read-only) \??\X: Dtldt.exe File opened (read-only) \??\M: Dtldt.exe File opened (read-only) \??\P: Dtldt.exe File opened (read-only) \??\Q: Dtldt.exe File opened (read-only) \??\U: Dtldt.exe File opened (read-only) \??\Z: Dtldt.exe File opened (read-only) \??\E: Dtldt.exe File opened (read-only) \??\J: Dtldt.exe File opened (read-only) \??\I: Dtldt.exe File opened (read-only) \??\N: Dtldt.exe File opened (read-only) \??\O: Dtldt.exe File opened (read-only) \??\R: Dtldt.exe File opened (read-only) \??\T: Dtldt.exe File opened (read-only) \??\G: Dtldt.exe File opened (read-only) \??\H: Dtldt.exe File opened (read-only) \??\L: Dtldt.exe File opened (read-only) \??\Y: Dtldt.exe File opened (read-only) \??\B: Dtldt.exe File opened (read-only) \??\K: Dtldt.exe -
Drops file in System32 directory 2 IoCs
Processes:
mngboot.exedescription ioc process File created C:\Windows\SysWOW64\Dtldt.exe mngboot.exe File opened for modification C:\Windows\SysWOW64\Dtldt.exe mngboot.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
Processes:
mngboot.exeDtldt.exeDtldt.exepid process 1468 mngboot.exe 1468 mngboot.exe 1468 mngboot.exe 4960 Dtldt.exe 4960 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Dtldt.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Dtldt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Dtldt.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
Dtldt.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum Dtldt.exe Key created \REGISTRY\USER\.DEFAULT\Software Dtldt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Dtldt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie Dtldt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" Dtldt.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Dtldt.exepid process 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe 4196 Dtldt.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
Dtldt.exepid process 4196 Dtldt.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
mngboot.exeDtldt.exedescription pid process Token: SeIncBasePriorityPrivilege 1468 mngboot.exe Token: SeLoadDriverPrivilege 4196 Dtldt.exe Token: 33 4196 Dtldt.exe Token: SeIncBasePriorityPrivilege 4196 Dtldt.exe Token: 33 4196 Dtldt.exe Token: SeIncBasePriorityPrivilege 4196 Dtldt.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
mngboot.exeDtldt.execmd.exedescription pid process target process PID 1468 wrote to memory of 2196 1468 mngboot.exe cmd.exe PID 1468 wrote to memory of 2196 1468 mngboot.exe cmd.exe PID 1468 wrote to memory of 2196 1468 mngboot.exe cmd.exe PID 4960 wrote to memory of 4196 4960 Dtldt.exe Dtldt.exe PID 4960 wrote to memory of 4196 4960 Dtldt.exe Dtldt.exe PID 4960 wrote to memory of 4196 4960 Dtldt.exe Dtldt.exe PID 2196 wrote to memory of 3984 2196 cmd.exe PING.EXE PID 2196 wrote to memory of 3984 2196 cmd.exe PING.EXE PID 2196 wrote to memory of 3984 2196 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\mngboot.exe"C:\Users\Admin\AppData\Local\Temp\mngboot.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\mngboot.exe > nul2⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:3984
-
-
-
C:\Windows\SysWOW64\Dtldt.exeC:\Windows\SysWOW64\Dtldt.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Dtldt.exeC:\Windows\SysWOW64\Dtldt.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD52a5f4c6d957f37ecea115fffe6d28467
SHA19fe8436f8e1f6198b883404f0b59256b4f08bbed
SHA2565058d869c59bfb3480d1dc6f8f51d191adb890039c89ff9fd668fe7b481099b8
SHA512673861e0bb2c2a4a26a9ab0a34fee45aa48e26b0677fb1815c9cc79fb1520d81c75d63d27af69e7229d79823022c5ca78ab4b7dd0d74388e84a93ef789a04ba8