Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 11:00
Static task
static1
Behavioral task
behavioral1
Sample
9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe
Resource
win7-20240221-en
General
-
Target
9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe
-
Size
1.5MB
-
MD5
391bb6e2e8a88975e7bb48adb2e3225b
-
SHA1
0f058cc3e1f1621a1618399115445deaa07af0a3
-
SHA256
9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08
-
SHA512
9edd1833a9e306fd08ea728a686fccfdfcf0cbd668751b9252c2aebe6c45f828e0aa6700c89dae42d3d022ddbebf4678a6ce901ecdda76e1404490415a9d023c
-
SSDEEP
24576:R09tv9/7JtDElDEExIko2H2HESq2eWJ6MQjySjy+SBS5r:R09XJt4HIN2H2tFvduyS3l
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1720-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1720-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1720-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1772-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1772-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1800-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1772-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1800-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1772-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1800-31-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1800-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/1720-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1720-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1720-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1772-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1772-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1800-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1772-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1800-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1772-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1800-31-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1800-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
Processes:
RVN.exeTXPlatforn.exeHD_9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exeTXPlatforn.exepid process 1720 RVN.exe 1772 TXPlatforn.exe 1436 HD_9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe 1800 TXPlatforn.exe -
Processes:
resource yara_rule behavioral2/memory/1720-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1720-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1720-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1720-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1772-14-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1772-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1772-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1800-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1772-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1800-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1772-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1800-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1800-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
RVN.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Drops file in Program Files directory 5 IoCs
Processes:
9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exepid process 2064 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe 2064 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 1800 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RVN.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 1720 RVN.exe Token: SeLoadDriverPrivilege 1800 TXPlatforn.exe Token: 33 1800 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1800 TXPlatforn.exe Token: 33 1800 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1800 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exepid process 2064 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe 2064 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exeRVN.exeTXPlatforn.execmd.exedescription pid process target process PID 2064 wrote to memory of 1720 2064 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe RVN.exe PID 2064 wrote to memory of 1720 2064 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe RVN.exe PID 2064 wrote to memory of 1720 2064 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe RVN.exe PID 1720 wrote to memory of 4640 1720 RVN.exe cmd.exe PID 1720 wrote to memory of 4640 1720 RVN.exe cmd.exe PID 1720 wrote to memory of 4640 1720 RVN.exe cmd.exe PID 2064 wrote to memory of 1436 2064 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe HD_9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe PID 2064 wrote to memory of 1436 2064 9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe HD_9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe PID 1772 wrote to memory of 1800 1772 TXPlatforn.exe TXPlatforn.exe PID 1772 wrote to memory of 1800 1772 TXPlatforn.exe TXPlatforn.exe PID 1772 wrote to memory of 1800 1772 TXPlatforn.exe TXPlatforn.exe PID 4640 wrote to memory of 4224 4640 cmd.exe PING.EXE PID 4640 wrote to memory of 4224 4640 cmd.exe PING.EXE PID 4640 wrote to memory of 4224 4640 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe"C:\Users\Admin\AppData\Local\Temp\9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\HD_9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exeC:\Users\Admin\AppData\Local\Temp\HD_9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe2⤵
- Executes dropped EXE
PID:1436
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_9faeebab6229bd07a48f3788e8872cc02c775efd002fc79dcc776f4fd1de6b08.exe
Filesize246KB
MD54d930d63a53f691fbd2ea578e4fe93f6
SHA122710228c9c2d822e6b793b48bf6d46754372336
SHA256cb0622cd904b82c23d290b94714e5dfbf14a75b281b2817d10330f2727afcfe8
SHA5120355768b1e80e100cd57b40b28c5906cfda778798379659600662a702b93f8e35b5e4be1cf79a80ea5f1e82b0694b8fe26a4f4a6ee41453e017e1d8f14d351b0
-
Filesize
1.3MB
MD518802f4f69bbf8c97e6cf6b850bb6a62
SHA1916a81c0ceb54c8e982ee38a92265e12704ab29a
SHA256054c7325a9ec69f273da2f77983a271d0b8a6db10ea604dda171b3073155d346
SHA512a1be30ff1fa39072cb408c9c16afbde2ba98690cf6d585513785c0dae3965d13d8ef8e030c31463ea3617c5ae419324dae942eb3279427f9d4944ab0147b134c
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4