Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 09:32
Static task
static1
Behavioral task
behavioral1
Sample
470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe
Resource
win7-20240221-en
General
-
Target
470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe
-
Size
5.7MB
-
MD5
8344461d89f161c3a28a440e67a08576
-
SHA1
4bc788e8bc5e5bda84d9668bf51876ede1d78539
-
SHA256
470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215
-
SHA512
1c943b5defffea1bae024a47ba5c5c12083ee2f956dbc4b25a34d9c01c62044e35a4533d534d50bb79649ec3ea0acca6f0998fcf179e78e583dd4676e8c47681
-
SSDEEP
98304:pws2ANnKXOaeOgmhQMrYUyjdcmZtrZsUko1qGAmL2lPiVkD5rJNkT1OZ7Nb7v9t0:bKXbeO7dWdz9xB3s5TkKJX9tiyq
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2748-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2748-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2708-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2708-49-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2708-51-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 6 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259400833.txt family_gh0strat behavioral1/memory/2748-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2748-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2708-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2708-49-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2708-51-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatfor.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
R.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\259400833.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatfor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
Processes:
R.exeN.exeTXPlatfor.exeTXPlatfor.exeHD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exeRemote Data.exepid process 2872 R.exe 2748 N.exe 2908 TXPlatfor.exe 2708 TXPlatfor.exe 2404 HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe 2680 Remote Data.exe -
Loads dropped DLL 9 IoCs
Processes:
470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exeR.exesvchost.exeTXPlatfor.exeRemote Data.exepid process 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe 2872 R.exe 2068 svchost.exe 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe 2908 TXPlatfor.exe 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe 2068 svchost.exe 2680 Remote Data.exe -
Processes:
resource yara_rule behavioral1/memory/2748-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2748-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2748-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2708-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2708-49-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2708-51-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exeN.exeR.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe File created C:\Windows\SysWOW64\259400833.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exepid process 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatfor.exepid process 2708 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
N.exeTXPlatfor.exedescription pid process Token: SeIncBasePriorityPrivilege 2748 N.exe Token: SeLoadDriverPrivilege 2708 TXPlatfor.exe Token: 33 2708 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2708 TXPlatfor.exe Token: 33 2708 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2708 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exeHD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exepid process 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe 2404 HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe 2404 HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exeN.exeTXPlatfor.execmd.exesvchost.exedescription pid process target process PID 2876 wrote to memory of 2872 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe R.exe PID 2876 wrote to memory of 2872 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe R.exe PID 2876 wrote to memory of 2872 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe R.exe PID 2876 wrote to memory of 2872 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe R.exe PID 2876 wrote to memory of 2748 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe N.exe PID 2876 wrote to memory of 2748 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe N.exe PID 2876 wrote to memory of 2748 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe N.exe PID 2876 wrote to memory of 2748 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe N.exe PID 2876 wrote to memory of 2748 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe N.exe PID 2876 wrote to memory of 2748 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe N.exe PID 2876 wrote to memory of 2748 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe N.exe PID 2748 wrote to memory of 2676 2748 N.exe cmd.exe PID 2748 wrote to memory of 2676 2748 N.exe cmd.exe PID 2748 wrote to memory of 2676 2748 N.exe cmd.exe PID 2748 wrote to memory of 2676 2748 N.exe cmd.exe PID 2908 wrote to memory of 2708 2908 TXPlatfor.exe TXPlatfor.exe PID 2908 wrote to memory of 2708 2908 TXPlatfor.exe TXPlatfor.exe PID 2908 wrote to memory of 2708 2908 TXPlatfor.exe TXPlatfor.exe PID 2908 wrote to memory of 2708 2908 TXPlatfor.exe TXPlatfor.exe PID 2908 wrote to memory of 2708 2908 TXPlatfor.exe TXPlatfor.exe PID 2908 wrote to memory of 2708 2908 TXPlatfor.exe TXPlatfor.exe PID 2908 wrote to memory of 2708 2908 TXPlatfor.exe TXPlatfor.exe PID 2876 wrote to memory of 2404 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe PID 2876 wrote to memory of 2404 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe PID 2876 wrote to memory of 2404 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe PID 2876 wrote to memory of 2404 2876 470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe PID 2676 wrote to memory of 2832 2676 cmd.exe PING.EXE PID 2676 wrote to memory of 2832 2676 cmd.exe PING.EXE PID 2676 wrote to memory of 2832 2676 cmd.exe PING.EXE PID 2676 wrote to memory of 2832 2676 cmd.exe PING.EXE PID 2068 wrote to memory of 2680 2068 svchost.exe Remote Data.exe PID 2068 wrote to memory of 2680 2068 svchost.exe Remote Data.exe PID 2068 wrote to memory of 2680 2068 svchost.exe Remote Data.exe PID 2068 wrote to memory of 2680 2068 svchost.exe Remote Data.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe"C:\Users\Admin\AppData\Local\Temp\470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exeC:\Users\Admin\AppData\Local\Temp\HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:2536
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\259400833.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2680
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD57f85815bfe921beeb37a0d2509d626cd
SHA14bca8ed608a3f951d95f535761c3b4277eae4b57
SHA2565c0b9e171878a84ea434c2e7095e96bb41e6f97a8dfaabe86e9348d14de02a0d
SHA512d3c1a6eb8c3e9e2bf5ba78459f41a8f9043d7bb132881cd9cebdc9636075a4bd10e49e7080813492bf7cae2a5860527c8f85fea3fc484655160519ba5437c636
-
\Users\Admin\AppData\Local\Temp\HD_470f33e83b84e765f7de3f312d595051107bd1ba066e0d118c62b34d31de6215.exe
Filesize3.1MB
MD58ff0f27913c89a13fa9d9a5211ad2c18
SHA107f4c677112098d9ff51a09915ce3fbbc2092942
SHA25613c3dd1453210b2a8c52c3d4ed91a6eccf24d860c58ef2b5e1b92d980f3be58d
SHA51235007c812b3d6b348e77d54a3c5d4abcf7df4b85b07e9a8d2f8e89eddbff725a4e27ec049a0f199b342eb75fb0dea5c8968db2f735bbb5d1ee1289563ea30a39
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
899KB
MD508ce0316c3e1ab66d6d2cf11e4dabb31
SHA101fb03988d24e67ee543db9d0e088415ae320a04
SHA256f30645cbcb167bf6772bddbc1adbcbfa68a74436c4e0f749c46bd83552528426
SHA51268b6ac5fb7e48d9a0d011b4fff16cf939c9c84cb08a01e1a4e90bc1f5cfd061c9cd75a4a529d63af0a0bb8fa598697c8a322afeb63f2f2abff99e3ccc5db77c8
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d