Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe
Resource
win7-20240508-en
General
-
Target
8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe
-
Size
4.8MB
-
MD5
b13109c0a0e825cd0e79c60291709522
-
SHA1
8836c4d20644d26f5a5f3028969fcc26bc3d686f
-
SHA256
8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4
-
SHA512
aabf21c7d4cf58285016dc89afe1e2b0834ad7b7841b17ae26c44d74fbefb8c89aadc414d382ce4578a680f6be856db1bd6cd6b511229e820503cbdc10d45eec
-
SSDEEP
98304:KGdVyVT9nOgmhM5dyWRudqIqf7UbXsPN5kiQaZ56:5WT9nO7Iol7S7z5VP6
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/744-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/744-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/744-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4884-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4884-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4884-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4844-83-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4844-82-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4884-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4844-84-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4844-88-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4844-89-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 13 IoCs
Processes:
resource yara_rule behavioral2/memory/744-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/744-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/744-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4884-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat C:\Windows\SysWOW64\240601625.txt family_gh0strat behavioral2/memory/4884-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4884-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4844-83-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4844-82-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4884-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4844-84-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4844-88-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4844-89-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
svchos.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240601625.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
Processes:
svchost.exeTXPlatforn.exesvchos.exeTXPlatforn.exeHD_8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 744 svchost.exe 4884 TXPlatforn.exe 1576 svchos.exe 4844 TXPlatforn.exe 1604 HD_8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe 2020 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
Processes:
svchos.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 1576 svchos.exe 4896 svchost.exe 2020 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Processes:
resource yara_rule behavioral2/memory/744-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/744-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/744-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/744-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4884-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4884-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4884-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4884-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4844-83-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4844-82-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4844-80-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4884-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4844-84-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4844-88-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4844-89-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchos.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240601625.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 5 IoCs
Processes:
8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exedescription ioc process File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exepid process 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 4844 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 744 svchost.exe Token: SeLoadDriverPrivilege 4844 TXPlatforn.exe Token: 33 4844 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4844 TXPlatforn.exe Token: 33 4844 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4844 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exepid process 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exesvchost.exeTXPlatforn.execmd.exesvchost.exedescription pid process target process PID 4280 wrote to memory of 744 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe svchost.exe PID 4280 wrote to memory of 744 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe svchost.exe PID 4280 wrote to memory of 744 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe svchost.exe PID 744 wrote to memory of 1232 744 svchost.exe cmd.exe PID 744 wrote to memory of 1232 744 svchost.exe cmd.exe PID 744 wrote to memory of 1232 744 svchost.exe cmd.exe PID 4280 wrote to memory of 1576 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe svchos.exe PID 4280 wrote to memory of 1576 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe svchos.exe PID 4280 wrote to memory of 1576 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe svchos.exe PID 4884 wrote to memory of 4844 4884 TXPlatforn.exe TXPlatforn.exe PID 4884 wrote to memory of 4844 4884 TXPlatforn.exe TXPlatforn.exe PID 4884 wrote to memory of 4844 4884 TXPlatforn.exe TXPlatforn.exe PID 4280 wrote to memory of 1604 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe HD_8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe PID 4280 wrote to memory of 1604 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe HD_8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe PID 4280 wrote to memory of 1604 4280 8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe HD_8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe PID 1232 wrote to memory of 2468 1232 cmd.exe PING.EXE PID 1232 wrote to memory of 2468 1232 cmd.exe PING.EXE PID 1232 wrote to memory of 2468 1232 cmd.exe PING.EXE PID 4896 wrote to memory of 2020 4896 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 4896 wrote to memory of 2020 4896 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 4896 wrote to memory of 2020 4896 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe"C:\Users\Admin\AppData\Local\Temp\8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\HD_8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exeC:\Users\Admin\AppData\Local\Temp\HD_8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe2⤵
- Executes dropped EXE
PID:1604
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:4376
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240601625.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_8fc82ac0223d2a839376deaddefa96e715708157ba483121601119d23790eed4.exe
Filesize3.1MB
MD5fb083acd60fe5c3156dc25442be815e3
SHA161df59b8f3ebd8b3d29ca3aedc4995e23cacf6d8
SHA256f130b3789962d5c8b59aa250d6f26ad5945928f3905b32bf65aa7bd30348a794
SHA5127147337d2c1006bb15cfa967c9eea6826b63c8d343f866e7454d7368d25019f39e52cf179500810834244c3ca9644d6c0df0b2c3128a9051e9ee6b428fa926f6
-
Filesize
1.7MB
MD54a52670696808889ad856e058ab8ef3d
SHA13bfc27027d27aa9a136173edf1679b3502411151
SHA256749be5dc22530b4709e3f4c298638bcdd28fc9aa4a5f6cd0ad42b1450811e739
SHA512eb1c35c09c6a8b25ce4840b393b1d3beb16222921eddb52449101d1756a75b9683222d23f7ab16b5075d08bb18243748c9db9b21ff783f81f5577e5ac6b0156a
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD59ccddd59f4e2f410ca7deecc1a812b49
SHA1f9b891488db714060209bf9d9b67a4fca253e630
SHA25653cec28f0fe68200f49a95028fabc6f745f4909d5a7a049329373bd86341d213
SHA51207ad5e38ac70253f1beea371fe0b63792e41445bac7c438a5f7438c7f9bb3e58fe87cb59bfdfeb968a21a2cfabd7ad113430454ae27163853e6771c1f4ec344a
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641