Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 04:05

General

  • Target

    6d63304e10db535e95b5fc2dcdb27d85a5a364ed8a9df7e536249586738bb7f3.exe

  • Size

    3.0MB

  • MD5

    dbdcba579712bb10c7a344394d555a70

  • SHA1

    46f76cc72521de1bf792e1f354e35cadf67a7171

  • SHA256

    6d63304e10db535e95b5fc2dcdb27d85a5a364ed8a9df7e536249586738bb7f3

  • SHA512

    5b788f8aabbbcae5e0105bb899b378669cbfc39b6d49b09c6510b28e3e2941dfb01ce9309eac267a55ad62303aac155bdfed6b24300672ab12e83538a7e2662c

  • SSDEEP

    98304:2oo0b+Djihd+BbSiXnnxxwoax6JBAUZL+:zCa7+BusxLJVy

Malware Config

Signatures

  • Detect PurpleFox Rootkit 5 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 12 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d63304e10db535e95b5fc2dcdb27d85a5a364ed8a9df7e536249586738bb7f3.exe
    "C:\Users\Admin\AppData\Local\Temp\6d63304e10db535e95b5fc2dcdb27d85a5a364ed8a9df7e536249586738bb7f3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Users\Admin\AppData\Local\Temp\»ª¸ç0528.exe
      C:\Users\Admin\AppData\Local\Temp\»ª¸ç0528.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\0528~1.EXE > nul
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:2600
    • C:\1.exe
      C:\1.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 572
        3⤵
        • Program crash
        PID:2916
  • C:\Windows\SysWOW64\Ghiya.exe
    C:\Windows\SysWOW64\Ghiya.exe -auto
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\SysWOW64\Ghiya.exe
      C:\Windows\SysWOW64\Ghiya.exe -acsi
      2⤵
      • Drops file in Drivers directory
      • Sets service image path in registry
      • Executes dropped EXE
      • Enumerates connected drives
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:2408

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\1.exe
    Filesize

    2.0MB

    MD5

    bafb857b13d2ef0c14597e0b714c3ab4

    SHA1

    6d89ab8e303db39f5cd55f643fa1449a554bab49

    SHA256

    59656c9826aeb3a543064724e4f091469ac04429c80db9416b389c0f48f47c5f

    SHA512

    c6fd61482b03b3ac6c9a7815825fcc974986c8bf6dfaeb6466ad591c32957f5e6cdbe6aba23f995989a5b3fa180292b54c81c55bfe74e0dddd7a6065936a4043

  • \Users\Admin\AppData\Local\Temp\»ª¸ç0528.exe
    Filesize

    357KB

    MD5

    1e7965a5200d61cbfccedf12a04a6076

    SHA1

    1c0038a124ccd9ba4f1e1857f15ea32b06cb107d

    SHA256

    6f2da003627c0287fbd5666fbc2e55f15dcbbd536937fa7d5df0b0c0df5fb787

    SHA512

    e6268c7314f48b4e11f3f222243bb326aed62cd3d334fa4f32e7e760063fa2937f3ea1900d90cd2f97a4b5f0cc512b1fe43b28162f5f27d2b7728aee7bc51db3

  • memory/1924-11-0x0000000000400000-0x0000000000543000-memory.dmp
    Filesize

    1.3MB

  • memory/1924-13-0x0000000010000000-0x00000000101A0000-memory.dmp
    Filesize

    1.6MB

  • memory/1924-29-0x0000000000400000-0x0000000000543000-memory.dmp
    Filesize

    1.3MB

  • memory/2408-33-0x0000000010000000-0x00000000101A0000-memory.dmp
    Filesize

    1.6MB

  • memory/2408-53-0x0000000000400000-0x0000000000543000-memory.dmp
    Filesize

    1.3MB

  • memory/2812-5-0x0000000002270000-0x00000000023B3000-memory.dmp
    Filesize

    1.3MB

  • memory/3036-32-0x0000000000400000-0x0000000000543000-memory.dmp
    Filesize

    1.3MB