Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 17:05
Static task
static1
Behavioral task
behavioral1
Sample
975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe
Resource
win7-20240221-en
General
-
Target
975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe
-
Size
1.8MB
-
MD5
2ecaad895fd81f043b09fc3fe37bdf32
-
SHA1
7ba3c0b70adbb9671cc4a800bcc515cd2352d04b
-
SHA256
975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9
-
SHA512
f31cdf0b9b79b33f7348a13f78fc80e7741ea627b489d909f8dbd8f181edecad414214110f8e74e80559c6ac1eb4dcee67a861e0151d68d89dcb36b669b9537c
-
SSDEEP
24576:ZQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVoI4HArOZDIXwqglte:ZQZAdVyVT9n/Gg0P+WhogrOKwqAw
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/628-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/628-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/628-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3868-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3868-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/628-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3868-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3196-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3196-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3196-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3196-39-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/628-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/628-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/628-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3868-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3868-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/628-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3868-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3196-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3196-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat C:\Windows\SysWOW64\240653359.txt family_gh0strat behavioral2/memory/3196-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3196-39-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
svchos.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240653359.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
Processes:
svchost.exeTXPlatforn.exesvchos.exeTXPlatforn.exeHD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 628 svchost.exe 3868 TXPlatforn.exe 2300 svchos.exe 3196 TXPlatforn.exe 640 HD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe 1752 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
Processes:
svchos.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 2300 svchos.exe 1268 svchost.exe 1752 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Processes:
resource yara_rule behavioral2/memory/628-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/628-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/628-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/628-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3868-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3868-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3868-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/628-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3868-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3196-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3196-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3196-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3196-39-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchos.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240653359.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 5 IoCs
Processes:
975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exeHD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exepid process 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe 640 HD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe 640 HD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 3196 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 628 svchost.exe Token: SeLoadDriverPrivilege 3196 TXPlatforn.exe Token: 33 3196 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3196 TXPlatforn.exe Token: 33 3196 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3196 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exepid process 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exesvchost.exeTXPlatforn.execmd.exesvchost.exedescription pid process target process PID 2236 wrote to memory of 628 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe svchost.exe PID 2236 wrote to memory of 628 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe svchost.exe PID 2236 wrote to memory of 628 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe svchost.exe PID 628 wrote to memory of 3480 628 svchost.exe cmd.exe PID 628 wrote to memory of 3480 628 svchost.exe cmd.exe PID 628 wrote to memory of 3480 628 svchost.exe cmd.exe PID 2236 wrote to memory of 2300 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe svchos.exe PID 2236 wrote to memory of 2300 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe svchos.exe PID 2236 wrote to memory of 2300 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe svchos.exe PID 3868 wrote to memory of 3196 3868 TXPlatforn.exe TXPlatforn.exe PID 3868 wrote to memory of 3196 3868 TXPlatforn.exe TXPlatforn.exe PID 3868 wrote to memory of 3196 3868 TXPlatforn.exe TXPlatforn.exe PID 3480 wrote to memory of 936 3480 cmd.exe PING.EXE PID 3480 wrote to memory of 936 3480 cmd.exe PING.EXE PID 3480 wrote to memory of 936 3480 cmd.exe PING.EXE PID 2236 wrote to memory of 640 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe HD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe PID 2236 wrote to memory of 640 2236 975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe HD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe PID 1268 wrote to memory of 1752 1268 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 1268 wrote to memory of 1752 1268 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 1268 wrote to memory of 1752 1268 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe"C:\Users\Admin\AppData\Local\Temp\975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:936
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\HD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exeC:\Users\Admin\AppData\Local\Temp\HD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:1280
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240653359.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD540450e32dbeb6cf0dd9d1dada6d642dc
SHA194d0bbadedb827b6ef50fd04c3246f908b567c5b
SHA256a182319b52700801102f48bfd08f6f8db7c102ccaf3242bff691a8e5124d4d93
SHA5129fc77ec616ea907acda5cd551eef396058a8f0220ebe40e645ab511111cdde0c643b473b9bb8e15aa2479a219e63b806bf6722e49666960cc12d20f62b2bc705
-
C:\Users\Admin\AppData\Local\Temp\HD_975bd24f432ef6fb752135929172444d5f4602725d6a11d6ef04580212f4bbd9.exe
Filesize551KB
MD5b65ea506c7a0d4b311f2b9feb351bec8
SHA11877ab89f073585c35748e5c46d5f3b958e81a99
SHA2568a0fbca6cbfd1d70779cf177423f02924354f4edc30f1ba8ab18d044b2a26173
SHA512fd2f906d30dface15ccf9527ef20f0195bcde1ff6b1400ab59c3bc73e5963ca317045b2abca7158bc86215f1629033272e30839fe4edb6e5422bcc4f481e6d7a
-
Filesize
1.2MB
MD576fc2bbff11f94e47f0ecd70ecc2da6f
SHA11dd2806048b4eac4256bab3b3322508e3bb4c51a
SHA256e0a583d4db7adc48236b1cbe70dac1ee631dff1c18e44ad178c3b84012176e90
SHA512ac3700b6223d89cdcee6e597f290850732678192bfeb0d7d792a4fd5436f1232005dc8fe19822671534851daa506c6d4521e0a023a1cf4b2a2542f3d2139beaf
-
Filesize
1.3MB
MD599de7688aeaa8e76092bc636c8934777
SHA10a2587f87088943f8e12820700b5dde801f789b6
SHA256557cac2e90c73f92815392b155a540249876c9a6871b31a5cdb77ba450ace660
SHA51218c237d3ae2ad9e85251f2406337e78ba0bcee98b960d21110c819e8987763c8ec76d261f671b7bf4008e97494e4c43c4fb19b83859c4faf2a71c55e543d21f0
-
Filesize
69KB
MD5e33fb6d686b1a8b171349572c5a33f67
SHA129f24fe536adf799b69b63c83efadc1bce457a54
SHA256020c8e0963f89f4b14538b7d69e83c6fec44a29bbbd52fbb6deb2be5c697f450
SHA512cf1f1d6a9efe53f84e5b4a8246b87c0b96496716605d1b00352d9aae30e664d3d2cbadebf598b4e690a9feef0b5785887a4e643cc5f68938ca744af1d3539e55
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5cf51af2aa9f677ec8e2af91fd45bf937
SHA1e45841385cfafc9791de516fd241f97be1b95442
SHA256ef4f4749a99fbd7e7c08d4b80cd17cd81e0d5fb9b3894c5804d39c21c85fba20
SHA512dfdc6bfbc4f3b48094e1bce7e59b080466e6a35bb8cc4403b56ab490566d1ffa7a2979d919ca15158f3f125edc3a2fc6bf792bdfc5ce53ed761a75cac2891721
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641