Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe
Resource
win7-20231129-en
General
-
Target
160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe
-
Size
6.6MB
-
MD5
0fb9b175b90807fdc70334542de0090d
-
SHA1
15ce437a7043d3e09b37a85425a4768bda2a168a
-
SHA256
160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6
-
SHA512
cd55c0d7b2962bc5bb34b3ebc40790d419997e62fa33cb3db838934c749ef0ac4bf841979e9fc260d9f5b4b9f633a14d6ac08d75028e726fc66c1d10323bad01
-
SSDEEP
196608:+KXbeO7+GFmn3x4HsuoM+u/XBo8PVXPV1JHpG:T7+GFgxBujRoEXPfC
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4580-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4580-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4580-14-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4244-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4244-24-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4244-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4244-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4148-49-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4148-53-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4148-54-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral2/files/0x0007000000023411-5.dat family_gh0strat behavioral2/memory/4580-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4580-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4580-14-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4244-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4244-24-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4244-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4244-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4148-49-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4148-53-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4148-54-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 5 IoCs
pid Process 224 R.exe 4580 N.exe 4244 TXPlatfor.exe 4148 TXPlatfor.exe 4360 HD_160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe -
Loads dropped DLL 1 IoCs
pid Process 224 R.exe -
resource yara_rule behavioral2/memory/4580-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4580-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4580-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4580-14-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4244-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4244-24-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4244-22-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4244-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4244-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4148-49-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4148-53-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4148-54-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\240602640.txt R.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2324 224 WerFault.exe 83 3116 224 WerFault.exe 83 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5032 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4148 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4580 N.exe Token: SeLoadDriverPrivilege 4148 TXPlatfor.exe Token: 33 4148 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 4148 TXPlatfor.exe Token: 33 4148 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 4148 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4824 wrote to memory of 224 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 83 PID 4824 wrote to memory of 224 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 83 PID 4824 wrote to memory of 224 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 83 PID 4824 wrote to memory of 4580 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 92 PID 4824 wrote to memory of 4580 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 92 PID 4824 wrote to memory of 4580 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 92 PID 4580 wrote to memory of 3224 4580 N.exe 94 PID 4580 wrote to memory of 3224 4580 N.exe 94 PID 4580 wrote to memory of 3224 4580 N.exe 94 PID 4244 wrote to memory of 4148 4244 TXPlatfor.exe 95 PID 4244 wrote to memory of 4148 4244 TXPlatfor.exe 95 PID 4244 wrote to memory of 4148 4244 TXPlatfor.exe 95 PID 4824 wrote to memory of 4360 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 96 PID 4824 wrote to memory of 4360 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 96 PID 4824 wrote to memory of 4360 4824 160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe 96 PID 3224 wrote to memory of 5032 3224 cmd.exe 98 PID 3224 wrote to memory of 5032 3224 cmd.exe 98 PID 3224 wrote to memory of 5032 3224 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe"C:\Users\Admin\AppData\Local\Temp\160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 4523⤵
- Program crash
PID:2324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 4603⤵
- Program crash
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:5032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exeC:\Users\Admin\AppData\Local\Temp\HD_160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe2⤵
- Executes dropped EXE
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 224 -ip 2241⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 224 -ip 2241⤵PID:4996
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_160a29c58922688eb508cc0f74c58d028081eec8ebbf1fb4f1c51f6885e0a7b6.exe
Filesize4.0MB
MD566e013398b639c3a099f0be23f51864a
SHA1974dccca8c47d5f1a3f795b23d99af3e451069c6
SHA256b0734d6028290bcc5605bae0e9dc78b5093f757dd5af2e879ac238e07efc8155
SHA51234bc8a55384948cb31b68d78e328a3301f72ca47c409c880d7cb8e8ee3c42bbb689e3a28e14bd1a1f2ecfbcde5c282383b814a870764c76ff329b1ed9b7f3a10
-
Filesize
2.6MB
MD5cc6686904fc733b0ce92db5550a0d9b6
SHA147d835c76d01a55ec92c85f44b82066fbc0d0fbe
SHA256b5568942318ecf39a50af34ab53cf561c95ba3b0db4b1a5f83525a32dc65f289
SHA5128b77c640cf727c2128e78809c95462665f87124f3d4958dfbe44214a9e485cb76e09410b761c1f8b8aa62af855f9d4cf583c875cf7e7e4e1d9096e04305c60e3
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
899KB
MD52ece474b314354fff0aa0fc9892a17ad
SHA1fe094d9fc36a64e816c1f4a85e871a6907bcbbc5
SHA2561f6ae2e365c8c3e5160c4a4242c5694d0af0a69ac5d66c293dded8f0c3131424
SHA51280556fd370c833e787ed482d786206722584c3691bba4141bee2ffa3d484654400224635932379d411a61d2bb34eae6e3665f881dbb224c91a019626621c9387