Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 11:06
Static task
static1
Behavioral task
behavioral1
Sample
47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe
Resource
win7-20240215-en
General
-
Target
47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe
-
Size
9.5MB
-
MD5
b0f7d9f58ea4a05269b88f330c82a500
-
SHA1
2bf8eb173b1959b54f5d2b52f504341f8b6fcde7
-
SHA256
47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82
-
SHA512
2a89db94e60cd2ccb58ab1dcf3d9397ff9ff9912f825c57ff9e8f8a791927a541116070708823ce08cde1cfaf829649b826abb312fad2e240a25ac25b6a14fbb
-
SSDEEP
98304:3GdVyVT9nOgmhrluL5dyWRudqIqf7mR31gvfTn5IGAW8ZZWAIxnqODAMLwJBAUZr:EWT9nO7Gol7S70wAJWAW1UJVr
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2916-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2916-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2916-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2672-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2672-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/3032-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1772-57-0x0000000003F50000-0x0000000004753000-memory.dmp purplefox_rootkit behavioral1/memory/3032-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/3032-85-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 10 IoCs
Processes:
resource yara_rule behavioral1/memory/2916-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2916-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2916-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2672-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat \Windows\SysWOW64\259395170.txt family_gh0strat behavioral1/memory/2672-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/3032-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1772-57-0x0000000003F50000-0x0000000004753000-memory.dmp family_gh0strat behavioral1/memory/3032-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/3032-85-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 5 IoCs
Processes:
svchost.exeTXPlatforn.exesvchos.exeTXPlatforn.exeHD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exepid process 2916 svchost.exe 2672 TXPlatforn.exe 2960 svchos.exe 3032 TXPlatforn.exe 2608 HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe -
Loads dropped DLL 12 IoCs
Processes:
47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exeTXPlatforn.exesvchos.exeWerFault.exepid process 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe 2672 TXPlatforn.exe 2960 svchos.exe 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe 1912 WerFault.exe 1912 WerFault.exe 1912 WerFault.exe 1912 WerFault.exe 1912 WerFault.exe 1912 WerFault.exe 1912 WerFault.exe -
Processes:
resource yara_rule behavioral1/memory/2916-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2916-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2916-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2916-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2672-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2672-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/3032-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1772-57-0x0000000003F50000-0x0000000004753000-memory.dmp upx behavioral1/memory/3032-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/3032-85-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
Processes:
svchos.exesvchost.exedescription ioc process File created C:\Windows\SysWOW64\259395170.txt svchos.exe File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1912 2608 WerFault.exe HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exepid process 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 3032 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 2916 svchost.exe Token: SeLoadDriverPrivilege 3032 TXPlatforn.exe Token: 33 3032 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3032 TXPlatforn.exe Token: 33 3032 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3032 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exeHD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exepid process 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe 2608 HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe 2608 HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exesvchost.exeTXPlatforn.execmd.exeHD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exedescription pid process target process PID 1772 wrote to memory of 2916 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchost.exe PID 1772 wrote to memory of 2916 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchost.exe PID 1772 wrote to memory of 2916 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchost.exe PID 1772 wrote to memory of 2916 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchost.exe PID 1772 wrote to memory of 2916 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchost.exe PID 1772 wrote to memory of 2916 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchost.exe PID 1772 wrote to memory of 2916 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchost.exe PID 2916 wrote to memory of 2576 2916 svchost.exe cmd.exe PID 2916 wrote to memory of 2576 2916 svchost.exe cmd.exe PID 2916 wrote to memory of 2576 2916 svchost.exe cmd.exe PID 2916 wrote to memory of 2576 2916 svchost.exe cmd.exe PID 1772 wrote to memory of 2960 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchos.exe PID 1772 wrote to memory of 2960 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchos.exe PID 1772 wrote to memory of 2960 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchos.exe PID 1772 wrote to memory of 2960 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe svchos.exe PID 2672 wrote to memory of 3032 2672 TXPlatforn.exe TXPlatforn.exe PID 2672 wrote to memory of 3032 2672 TXPlatforn.exe TXPlatforn.exe PID 2672 wrote to memory of 3032 2672 TXPlatforn.exe TXPlatforn.exe PID 2672 wrote to memory of 3032 2672 TXPlatforn.exe TXPlatforn.exe PID 2672 wrote to memory of 3032 2672 TXPlatforn.exe TXPlatforn.exe PID 2672 wrote to memory of 3032 2672 TXPlatforn.exe TXPlatforn.exe PID 2672 wrote to memory of 3032 2672 TXPlatforn.exe TXPlatforn.exe PID 2576 wrote to memory of 2684 2576 cmd.exe PING.EXE PID 2576 wrote to memory of 2684 2576 cmd.exe PING.EXE PID 2576 wrote to memory of 2684 2576 cmd.exe PING.EXE PID 2576 wrote to memory of 2684 2576 cmd.exe PING.EXE PID 1772 wrote to memory of 2608 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe PID 1772 wrote to memory of 2608 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe PID 1772 wrote to memory of 2608 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe PID 1772 wrote to memory of 2608 1772 47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe PID 2608 wrote to memory of 1912 2608 HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe WerFault.exe PID 2608 wrote to memory of 1912 2608 HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe WerFault.exe PID 2608 wrote to memory of 1912 2608 HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe WerFault.exe PID 2608 wrote to memory of 1912 2608 HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe"C:\Users\Admin\AppData\Local\Temp\47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exeC:\Users\Admin\AppData\Local\Temp\HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 4643⤵
- Loads dropped DLL
- Program crash
PID:1912
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5251a802e8bb13e39fe89ac035ed6fefd
SHA1f429ee4243604981679ee4cba673773f2060ef23
SHA2567c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a
SHA512fb520d84b406bdf877e68fd9de6da9484c0f58bf5344045113099ac19d444b45f0c898ff4a6f7b93ad2784aba2400023f9242c4ed5edcf03b56d4b03e07ff838
-
\Users\Admin\AppData\Local\Temp\HD_47693bfe4cfbb84f7d582b50cdb43f13791d1b2b7996f2c342091814bbdd7f82.exe
Filesize7.9MB
MD5b41849196494f96020fc8b86d73f4e2b
SHA143d260823059fa04493984559e11af766e7acf6f
SHA256982c049b039501564f25bf23bd5737a4082273427affa5759bd1b3e2184977be
SHA512baf94f17e1ea991d40e562b5f5a8bbf3dec52b880badd9249695cdcbf087286f0adf8244bd73d762222207ff2138b635bf8f18d76868dfb28d293ffb6f2abb4d
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5c24d21458865d6a090ea168151d5fb7b
SHA1ce068224257d12e7412b0651aab7bbe7a5a48ce9
SHA256ca3d7fd64a3d4f0fee4360bd424d8238c5585e87f2668c9a513a4409b1bafa76
SHA512dc067dfe7a0b03a7bf78128a215dde2b94ea19aa7dadf521d5b8440dcba7b8ca82011643942e562e79444894ebc2977dbef7663fade0f01de7e24da4d22bea42