Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe
Resource
win7-20240220-en
General
-
Target
5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe
-
Size
5.3MB
-
MD5
302637ac6d0cf20d45fe6663c835b961
-
SHA1
7f73c862014a3948784e2969645d12f624404c01
-
SHA256
5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb
-
SHA512
2928455bc86dd93e0587bb8b99047b87d75fc01c974b26bc7cf7de085c3b2f237078485d1388e2482b5020eeac58060d9d822556901a57a273775a7b3180d238
-
SSDEEP
98304:hGdVyVT9nOgmhNUty9VBEkPbN6XXR8yS6k7u4IUWKPGeJUty9VBEkP3YRz7xPNIt:eWT9nO73Uty9VBEkPhCXR8H7u5U1PtJ3
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2200-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2200-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2200-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4816-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4816-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4816-24-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4816-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4860-33-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4860-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4860-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/2200-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2200-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2200-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4816-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4816-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4816-24-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4860-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat C:\Windows\SysWOW64\240598093.txt family_gh0strat behavioral2/memory/4816-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4860-33-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4860-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4860-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 5 IoCs
Processes:
svchost.exeTXPlatforn.exesvchos.exeTXPlatforn.exeHD_5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exepid process 2200 svchost.exe 4816 TXPlatforn.exe 624 svchos.exe 4860 TXPlatforn.exe 4432 HD_5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe -
Loads dropped DLL 1 IoCs
Processes:
svchos.exepid process 624 svchos.exe -
Processes:
resource yara_rule behavioral2/memory/2200-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2200-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2200-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2200-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4816-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4816-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4816-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4816-24-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4860-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4816-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4860-33-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4860-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4860-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
Processes:
svchost.exesvchos.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240598093.txt svchos.exe -
Drops file in Program Files directory 5 IoCs
Processes:
5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2436 624 WerFault.exe svchos.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exepid process 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 4860 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 2200 svchost.exe Token: SeLoadDriverPrivilege 4860 TXPlatforn.exe Token: 33 4860 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4860 TXPlatforn.exe Token: 33 4860 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4860 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exepid process 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exesvchost.exeTXPlatforn.execmd.exedescription pid process target process PID 2124 wrote to memory of 2200 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe svchost.exe PID 2124 wrote to memory of 2200 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe svchost.exe PID 2124 wrote to memory of 2200 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe svchost.exe PID 2200 wrote to memory of 1036 2200 svchost.exe cmd.exe PID 2200 wrote to memory of 1036 2200 svchost.exe cmd.exe PID 2200 wrote to memory of 1036 2200 svchost.exe cmd.exe PID 2124 wrote to memory of 624 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe svchos.exe PID 2124 wrote to memory of 624 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe svchos.exe PID 2124 wrote to memory of 624 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe svchos.exe PID 4816 wrote to memory of 4860 4816 TXPlatforn.exe TXPlatforn.exe PID 4816 wrote to memory of 4860 4816 TXPlatforn.exe TXPlatforn.exe PID 4816 wrote to memory of 4860 4816 TXPlatforn.exe TXPlatforn.exe PID 1036 wrote to memory of 5024 1036 cmd.exe PING.EXE PID 1036 wrote to memory of 5024 1036 cmd.exe PING.EXE PID 1036 wrote to memory of 5024 1036 cmd.exe PING.EXE PID 2124 wrote to memory of 4432 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe HD_5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe PID 2124 wrote to memory of 4432 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe HD_5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe PID 2124 wrote to memory of 4432 2124 5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe HD_5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe"C:\Users\Admin\AppData\Local\Temp\5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 624 -s 4523⤵
- Program crash
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\HD_5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exeC:\Users\Admin\AppData\Local\Temp\HD_5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe2⤵
- Executes dropped EXE
PID:4432
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 624 -ip 6241⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_5513ce49b50a085b736704f144d2b173ee50951c197878aa8378dceca029cedb.exe
Filesize3.7MB
MD52ca13048809501b4096bbbaa6057d74e
SHA11b4d46c1158fdecca3fef34411fc3abacffda7a4
SHA256b237c2de26a3d4d435068c93ff74e77ba66a62028f6ced58e416c5b7f1c9bcb5
SHA512d20c544e5bd080c3d594ae0d35e874a4050b0c38aa6c1bf0769c6ca715bf3fc1fe37d42308386e192f942a7ae79d6e43f439ec2c609ea72c5462ef63e3f9ec8d
-
Filesize
1.5MB
MD54eae6f394aa981542a565a2262a8a70c
SHA160362c4e6559a88ad480ae2a0ebdb0e192d09433
SHA25650bd8f07425d307b0a02ef39c1a388426acfabba91f261868ca1d1527baf2c29
SHA51245a8faf138e1e71d809d87a8bca39bc4b4b19d7d09731a663cb7ec9dc820caf5acffa0563e9b1e6fcf125e2c318b384d40db0a9b3b7b4323ab0eda3445ffe46c
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD59950e034f845119f7f1b76e44a646540
SHA164b5bd33c45ce97d4890b9d49834bd37f4d2d235
SHA25682054955bca8cd023a4f145f1637e9efcbca5df8421baefd8850a3bd99b02eac
SHA512dfe9c69c97f6811f44d261ebb06d22537c61b95fe8e7456ebb88e56cba561c2737000ad01bb5cfc98cbb3a0a99ccb10a38a7ea9ec3fb2165a99536a700c43710