Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe
Resource
win7-20240508-en
General
-
Target
e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe
-
Size
3.3MB
-
MD5
534dc27fc6e0fadae9e578b7ba252eb1
-
SHA1
ec2d7aa2b025bdf2b78015539495bdded4789151
-
SHA256
e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4
-
SHA512
9a6254d636a39fdae05f05fed952d2a9b65413bf6c08f7a72c5bc9c938118fdb26e6e99b3209b8988340a09dd1af5c7370465e1095048e119ad03ff6f06cf868
-
SSDEEP
49152:ECwsbCANnKXferL7Vwe/Gg0P+WhelDCom:Hws2ANnKXOaeOgmhelmom
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4220-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4220-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/752-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/752-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4220-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2660-41-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2660-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2660-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
Processes:
resource yara_rule C:\Windows\SysWOW64\240640531.txt family_gh0strat behavioral2/memory/4220-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4220-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/752-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/752-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4220-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2660-41-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2660-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2660-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatfor.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
R.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\240640531.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatfor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
Processes:
R.exeN.exeTXPlatfor.exeHD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exeTXPlatfor.exeRemote Data.exepid process 3292 R.exe 4220 N.exe 752 TXPlatfor.exe 5040 HD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe 2660 TXPlatfor.exe 1252 Remote Data.exe -
Loads dropped DLL 3 IoCs
Processes:
R.exesvchost.exeRemote Data.exepid process 3292 R.exe 2936 svchost.exe 1252 Remote Data.exe -
Processes:
resource yara_rule behavioral2/memory/4220-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4220-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4220-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/752-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/752-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4220-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/752-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2660-41-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2660-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2660-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
Processes:
R.exesvchost.exeN.exedescription ioc process File created C:\Windows\SysWOW64\240640531.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exepid process 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatfor.exepid process 2660 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
N.exeTXPlatfor.exedescription pid process Token: SeIncBasePriorityPrivilege 4220 N.exe Token: SeLoadDriverPrivilege 2660 TXPlatfor.exe Token: 33 2660 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2660 TXPlatfor.exe Token: 33 2660 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2660 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exepid process 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exeN.exeTXPlatfor.execmd.exesvchost.exeHD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exedescription pid process target process PID 2040 wrote to memory of 3292 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe R.exe PID 2040 wrote to memory of 3292 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe R.exe PID 2040 wrote to memory of 3292 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe R.exe PID 2040 wrote to memory of 4220 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe N.exe PID 2040 wrote to memory of 4220 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe N.exe PID 2040 wrote to memory of 4220 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe N.exe PID 4220 wrote to memory of 4124 4220 N.exe cmd.exe PID 4220 wrote to memory of 4124 4220 N.exe cmd.exe PID 4220 wrote to memory of 4124 4220 N.exe cmd.exe PID 2040 wrote to memory of 5040 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe HD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe PID 2040 wrote to memory of 5040 2040 e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe HD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe PID 752 wrote to memory of 2660 752 TXPlatfor.exe TXPlatfor.exe PID 752 wrote to memory of 2660 752 TXPlatfor.exe TXPlatfor.exe PID 752 wrote to memory of 2660 752 TXPlatfor.exe TXPlatfor.exe PID 4124 wrote to memory of 968 4124 cmd.exe PING.EXE PID 4124 wrote to memory of 968 4124 cmd.exe PING.EXE PID 4124 wrote to memory of 968 4124 cmd.exe PING.EXE PID 2936 wrote to memory of 1252 2936 svchost.exe Remote Data.exe PID 2936 wrote to memory of 1252 2936 svchost.exe Remote Data.exe PID 2936 wrote to memory of 1252 2936 svchost.exe Remote Data.exe PID 5040 wrote to memory of 2720 5040 HD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe msedge.exe PID 5040 wrote to memory of 2720 5040 HD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe"C:\Users\Admin\AppData\Local\Temp\e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3292
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exeC:\Users\Admin\AppData\Local\Temp\HD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pc.weixin.qq.com/3⤵PID:2720
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:4672
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\240640531.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1252
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3888,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4488 /prefetch:81⤵PID:2136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4280,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4748 /prefetch:11⤵PID:388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4764,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:11⤵PID:1468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=5448,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5468 /prefetch:11⤵PID:4220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5492,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5616 /prefetch:81⤵PID:752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5952,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5972 /prefetch:11⤵PID:4392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=4608,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5640 /prefetch:11⤵PID:4532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5032,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=5256 /prefetch:81⤵PID:584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=5660,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=4060 /prefetch:81⤵PID:1504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=2364,i,13281073920029625837,8253721632651544158,262144 --variations-seed-version --mojo-platform-channel-handle=3680 /prefetch:81⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5372a9a2d1060b5f7ff3aa37b5acefe82
SHA1808cafae83c76ab59a48404748170b66f5bd6c44
SHA2561c1842e702cb832b3c021d2857d2a346cbb98250b6f8d7c4f214a666c1cac0e8
SHA512a55a10e0c18daadefbe19141915ae9c2ae3d92affb9ecf52ce906039c8ac2cccd54b19417440f388e8dd18a61ca71537723363bef99332c08b299e9f9f1d4288
-
C:\Users\Admin\AppData\Local\Temp\HD_e75a4799355d4b5288255b071d341089f2556d720c89d2e4dc73f982db7734e4.exe
Filesize644KB
MD5e1b51248e9657f48a0daefc3958f7864
SHA1248878fea5a3b5708c0621ce197d18b42f44f85b
SHA256d8df1e229becafa07c85a1ea8d7f777f92280720fea9144a5df7176c52795f93
SHA512c789b3de67a41dbd51a1715b72b3620d8d41299544a2c141105a942e8a24616d2ee7d3337de0b450c0981613f86f46bd9e428505db39ecfb57133f3e5a353b03
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
899KB
MD5dbed2ab3f6d33728c5066fc0121be95c
SHA1d94e82e9226a5cf3ca8d3372b5eac3d7a325927a
SHA25629422d641757bec4dec618222240c358b9574033cf5dc10322a3c7c1023ac2a1
SHA51205ba8f704636a9e700549257f20c6b1830977d5dc3e4dbf976a7fb0ad7f76cdc025f9e5a285f0ab3b8198026444626f7fb335bd0af399fec7bafafa4d8ec6717
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641