Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe
Resource
win7-20240508-en
General
-
Target
6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe
-
Size
3.8MB
-
MD5
d01f129bcabff635dba34c3775ef7d1f
-
SHA1
1f67cf1499111ccec289072013f558b363957389
-
SHA256
6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb
-
SHA512
81e617110f4eb12af71542fa56c3c7d671b0aa9b56a0d3be9aca43a05be4c6413d305551d11f1d7834b2ba3c28fc64c79de1105bf8f3cc3ae328a4d8684f9301
-
SSDEEP
49152:OQZAdVyVT9n/Gg0P+Who2Syn2yZ/s5w7Ab95SagnzK3K+rts9qEAFWrzsR0cTyjz:fGdVyVT9nOgmhtSyn2dekrusgrYIjz
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3700-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3700-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3700-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1348-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4396-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4396-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4396-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1348-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1348-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4396-50-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/3700-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3700-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3700-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1348-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1348-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4396-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat C:\Windows\SysWOW64\240598906.txt family_gh0strat behavioral2/memory/4396-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4396-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1348-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1348-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4396-50-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
svchos.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240598906.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
Processes:
svchost.exeTXPlatforn.exeTXPlatforn.exesvchos.exeHD_6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 3700 svchost.exe 1348 TXPlatforn.exe 4396 TXPlatforn.exe 4404 svchos.exe 2020 HD_6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe 4204 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
Processes:
svchos.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 4404 svchos.exe 3820 svchost.exe 4204 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Processes:
resource yara_rule behavioral2/memory/3700-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3700-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3700-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3700-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1348-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1348-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1348-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4396-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4396-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4396-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1348-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1348-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4396-50-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchos.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240598906.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 5 IoCs
Processes:
6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exepid process 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 4396 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 3700 svchost.exe Token: SeLoadDriverPrivilege 4396 TXPlatforn.exe Token: 33 4396 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4396 TXPlatforn.exe Token: 33 4396 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4396 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exepid process 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exesvchost.exeTXPlatforn.execmd.exesvchost.exedescription pid process target process PID 1480 wrote to memory of 3700 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe svchost.exe PID 1480 wrote to memory of 3700 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe svchost.exe PID 1480 wrote to memory of 3700 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe svchost.exe PID 3700 wrote to memory of 4688 3700 svchost.exe cmd.exe PID 3700 wrote to memory of 4688 3700 svchost.exe cmd.exe PID 3700 wrote to memory of 4688 3700 svchost.exe cmd.exe PID 1348 wrote to memory of 4396 1348 TXPlatforn.exe TXPlatforn.exe PID 1348 wrote to memory of 4396 1348 TXPlatforn.exe TXPlatforn.exe PID 1348 wrote to memory of 4396 1348 TXPlatforn.exe TXPlatforn.exe PID 1480 wrote to memory of 4404 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe svchos.exe PID 1480 wrote to memory of 4404 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe svchos.exe PID 1480 wrote to memory of 4404 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe svchos.exe PID 1480 wrote to memory of 2020 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe HD_6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe PID 1480 wrote to memory of 2020 1480 6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe HD_6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe PID 4688 wrote to memory of 1044 4688 cmd.exe PING.EXE PID 4688 wrote to memory of 1044 4688 cmd.exe PING.EXE PID 4688 wrote to memory of 1044 4688 cmd.exe PING.EXE PID 3820 wrote to memory of 4204 3820 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 3820 wrote to memory of 4204 3820 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 3820 wrote to memory of 4204 3820 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe"C:\Users\Admin\AppData\Local\Temp\6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\HD_6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exeC:\Users\Admin\AppData\Local\Temp\HD_6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe2⤵
- Executes dropped EXE
PID:2020
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:4220
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240598906.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_6075ce57b120917839b2049a2269accb70aaf745d9bf46721f113f0c3e65e5cb.exe
Filesize2.1MB
MD5391fcf5c3b2898036af882d647444599
SHA1359adcf02f64b9215b8a90c0b92bfcd74a894128
SHA2561a89c812630805cc1f876eb2969aa1f88591b18de2a85fa50f7228b1f78f464c
SHA51282d3bcab21ee33926da4515f35a3caaa45404382e596c32b4895f8a2cf753a29053344bccd8e8a18c3826aed9a97add8d94ec0cef965fac5d31dced652bdad5a
-
Filesize
1.6MB
MD5b209e9054fcc9fd47ba5acd3af4fa62e
SHA1e2221583699e772d50adef5297c6cc49be7cc904
SHA256f1f2291599841f2a10b26cfe2514f745e5ae2502cbbfe055616174006f118d2c
SHA51207d7a95e8565c0e670230698aa6bd0ec99c72445dcf8f37d405584e5498832a46dc4ea80cd57b17d52ace80be70a3ad57d50bf24a57281bfaecf3efd21b1a449
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD583c3e3133c0c46d4c3ab7a2bef71c200
SHA105a6428f2b6342a5faa9d81b0ba723dc3cc119fe
SHA25676be5bac8fc697f342c83d085cda0a11b284df530dfe85af4b1d72f4299a3a23
SHA512d370b546f04c7af4a4b59d32792e015ba5cda3f447dd582f45e81f686ab3a7eba3adac101793484d41126922ef1cc049b90168c283aedd2cd3ac822d86ec5f31
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641