Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 20:13
Behavioral task
behavioral1
Sample
da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe
Resource
win7-20240220-en
General
-
Target
da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe
-
Size
2.6MB
-
MD5
e8a1a6e481f38883d4d8a748e7ba6879
-
SHA1
ca4f7c93966cc295e54fbf38906c66e75aade4ed
-
SHA256
da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01
-
SHA512
c8cfce65e7b216de299045aabce3e8a571c325b61bde9ce21087a4a3845bc64ec34e91d7e3e6771e7d51c8f6bff10d40ad3c680c099eab748ba7b56f0441d11e
-
SSDEEP
49152:mxTc2H2tFvduySkrt1k9q8pe0L3zMb2XCpmdeW:Ecy2LkkXkQ8pb3T/
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3148-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3148-12-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3148-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3496-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3496-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3496-24-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3496-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1280-31-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1280-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1280-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1280-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1280-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/3148-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3148-12-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3148-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3496-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3496-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3496-24-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3496-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1280-31-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1280-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1280-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1280-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1280-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
Processes:
RVN.exeHD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exeTXPlatforn.exeTXPlatforn.exepid process 3148 RVN.exe 2212 HD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe 3496 TXPlatforn.exe 1280 TXPlatforn.exe -
Processes:
resource yara_rule behavioral2/memory/3148-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3148-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3148-12-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3148-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3496-22-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3496-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3496-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3496-24-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3496-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1280-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1280-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1280-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1280-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1280-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1280-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
RVN.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exeHD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exepid process 4676 da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe 4676 da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe 2212 HD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe 2212 HD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 1280 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RVN.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 3148 RVN.exe Token: SeLoadDriverPrivilege 1280 TXPlatforn.exe Token: 33 1280 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1280 TXPlatforn.exe Token: 33 1280 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1280 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exepid process 4676 da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exeRVN.exeTXPlatforn.execmd.exedescription pid process target process PID 4676 wrote to memory of 3148 4676 da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe RVN.exe PID 4676 wrote to memory of 3148 4676 da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe RVN.exe PID 4676 wrote to memory of 3148 4676 da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe RVN.exe PID 4676 wrote to memory of 2212 4676 da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe HD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe PID 4676 wrote to memory of 2212 4676 da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe HD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe PID 4676 wrote to memory of 2212 4676 da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe HD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe PID 3148 wrote to memory of 4500 3148 RVN.exe cmd.exe PID 3148 wrote to memory of 4500 3148 RVN.exe cmd.exe PID 3148 wrote to memory of 4500 3148 RVN.exe cmd.exe PID 3496 wrote to memory of 1280 3496 TXPlatforn.exe TXPlatforn.exe PID 3496 wrote to memory of 1280 3496 TXPlatforn.exe TXPlatforn.exe PID 3496 wrote to memory of 1280 3496 TXPlatforn.exe TXPlatforn.exe PID 4500 wrote to memory of 2340 4500 cmd.exe PING.EXE PID 4500 wrote to memory of 2340 4500 cmd.exe PING.EXE PID 4500 wrote to memory of 2340 4500 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe"C:\Users\Admin\AppData\Local\Temp\da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\HD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exeC:\Users\Admin\AppData\Local\Temp\HD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_da7d20fcfa3899279b6f412583a15937295c061b984eaa087916c58844ba0f01.exe
Filesize1.7MB
MD55b0f73b2adecdaddbe8df165ca96ae92
SHA1a1f61ab02f95100c8cf759644ab4f7d68b29e0e1
SHA2569b9947a3074572f03d8f11fd3b1c2a0c9ffe7cf85694220616a0e21f1f51f61d
SHA5122f95d0cb4065acd1f3f191bdab630115454ed269c366eb08689c5eaf71831281065ee5e997862724735123d0fa6ec831ba7969b2831692ca54655c3477fabc4c
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
1.8MB
MD55ec30e92354b65dee85fe1a0c8ef9fba
SHA1621375b120d15a2e6082657141a070904257f8bf
SHA25624d7e2243367913da7a4520f3d188349277783653e3144e2111ba96d139314bc
SHA5129aa05192192dd91b3ea0f7357c9b65e93157b8cfe862639e0bbebf3ef340059401631990b9f053102a08549326e4d17de78a41a3713db62184c4b3dee16bd90c