Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe
Resource
win7-20240221-en
General
-
Target
1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe
-
Size
756KB
-
MD5
1de1f5d320577ea30a8e8535cabc0e37
-
SHA1
7eab68525be999494410a768c98e97659844c181
-
SHA256
1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1
-
SHA512
87cd217cd856f397adfcc371e4c5715159c7c8d8a401e8e82acbc864c4d0d87d67f5c714b45507c17a6327054d97c56cc1f2cbc33c2d9487474e80195be0ff2f
-
SSDEEP
12288:Hi2cAro2HQVWAHkFSq2hAWJYlMUtrxlyuJVRe8ykCZd7WdF4nfV:Hi2Tro2H2HESq2eWJ6MQjySjyHk4nfV
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/60-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/60-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/60-11-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1940-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1940-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1940-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1940-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5064-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5064-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5064-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5064-31-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/60-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/60-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/60-11-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1940-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1940-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1940-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1940-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5064-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5064-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5064-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5064-31-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 3 IoCs
Processes:
RVN.exeTXPlatforn.exeTXPlatforn.exepid process 60 RVN.exe 1940 TXPlatforn.exe 5064 TXPlatforn.exe -
Processes:
resource yara_rule behavioral2/memory/60-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/60-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/60-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/60-11-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1940-14-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1940-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1940-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1940-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1940-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5064-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5064-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5064-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5064-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
RVN.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 5064 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RVN.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 60 RVN.exe Token: SeLoadDriverPrivilege 5064 TXPlatforn.exe Token: 33 5064 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 5064 TXPlatforn.exe Token: 33 5064 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 5064 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exepid process 4648 1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exeRVN.exeTXPlatforn.execmd.exedescription pid process target process PID 4648 wrote to memory of 60 4648 1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe RVN.exe PID 4648 wrote to memory of 60 4648 1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe RVN.exe PID 4648 wrote to memory of 60 4648 1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe RVN.exe PID 60 wrote to memory of 2584 60 RVN.exe cmd.exe PID 60 wrote to memory of 2584 60 RVN.exe cmd.exe PID 60 wrote to memory of 2584 60 RVN.exe cmd.exe PID 1940 wrote to memory of 5064 1940 TXPlatforn.exe TXPlatforn.exe PID 1940 wrote to memory of 5064 1940 TXPlatforn.exe TXPlatforn.exe PID 1940 wrote to memory of 5064 1940 TXPlatforn.exe TXPlatforn.exe PID 2584 wrote to memory of 3352 2584 cmd.exe PING.EXE PID 2584 wrote to memory of 3352 2584 cmd.exe PING.EXE PID 2584 wrote to memory of 3352 2584 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe"C:\Users\Admin\AppData\Local\Temp\1ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:3352
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:5064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756KB
MD51de1f5d320577ea30a8e8535cabc0e37
SHA17eab68525be999494410a768c98e97659844c181
SHA2561ccd26ea7771855951d62df3cc0d8fc6a9e367e110b0e869aad8e2655dfdc2f1
SHA51287cd217cd856f397adfcc371e4c5715159c7c8d8a401e8e82acbc864c4d0d87d67f5c714b45507c17a6327054d97c56cc1f2cbc33c2d9487474e80195be0ff2f
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4