Analysis
-
max time kernel
154s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 02:57
Static task
static1
Behavioral task
behavioral1
Sample
ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe
Resource
win7-20240221-en
General
-
Target
ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe
-
Size
2.5MB
-
MD5
3030278fede9a055d39ddf84387f1529
-
SHA1
c2053a7cac4ba3a876fc1e39e6c5359903d263a6
-
SHA256
ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f
-
SHA512
f8fb88125e8100f9d441007e0c892b311afe4f5201e5b6ca5f24549a1ecfb76e8e09b8c7a72e05a4d986e57e8c87ffbea931703713d53e592dba32ed7075b0ad
-
SSDEEP
49152:R09XJt4HIN2H2tFvduySiKPDeli41J9LmlaUzpb7:yZJt4HINy2LkrPDel/F+
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4896-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4896-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4896-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3300-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3300-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3300-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4896-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3300-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4612-31-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4612-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4612-33-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4612-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/4896-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4896-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4896-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3300-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3300-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3300-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4896-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3300-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4612-31-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4612-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4612-33-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4612-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
Processes:
RVN.exeTXPlatforn.exeTXPlatforn.exeHD_ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exepid process 4896 RVN.exe 3300 TXPlatforn.exe 4612 TXPlatforn.exe 3304 HD_ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe -
Processes:
resource yara_rule behavioral2/memory/4896-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4896-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4896-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4896-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3300-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3300-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3300-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3300-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4896-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3300-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4612-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4612-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4612-33-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4612-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
RVN.exedescription ioc process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Drops file in Program Files directory 5 IoCs
Processes:
ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exepid process 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 4612 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RVN.exeTXPlatforn.exedescription pid process Token: SeIncBasePriorityPrivilege 4896 RVN.exe Token: SeLoadDriverPrivilege 4612 TXPlatforn.exe Token: 33 4612 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4612 TXPlatforn.exe Token: 33 4612 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4612 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exepid process 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exeRVN.exeTXPlatforn.execmd.exedescription pid process target process PID 3148 wrote to memory of 4896 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe RVN.exe PID 3148 wrote to memory of 4896 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe RVN.exe PID 3148 wrote to memory of 4896 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe RVN.exe PID 4896 wrote to memory of 4928 4896 RVN.exe cmd.exe PID 4896 wrote to memory of 4928 4896 RVN.exe cmd.exe PID 4896 wrote to memory of 4928 4896 RVN.exe cmd.exe PID 3300 wrote to memory of 4612 3300 TXPlatforn.exe TXPlatforn.exe PID 3300 wrote to memory of 4612 3300 TXPlatforn.exe TXPlatforn.exe PID 3300 wrote to memory of 4612 3300 TXPlatforn.exe TXPlatforn.exe PID 3148 wrote to memory of 3304 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe HD_ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe PID 3148 wrote to memory of 3304 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe HD_ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe PID 3148 wrote to memory of 3304 3148 ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe HD_ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe PID 4928 wrote to memory of 4984 4928 cmd.exe PING.EXE PID 4928 wrote to memory of 4984 4928 cmd.exe PING.EXE PID 4928 wrote to memory of 4984 4928 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe"C:\Users\Admin\AppData\Local\Temp\ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\HD_ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exeC:\Users\Admin\AppData\Local\Temp\HD_ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4256 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_X.datFilesize
1.3MB
MD575319694da7ff6a660e15654e8691478
SHA16cdb9f457d03a9e81145694fe7b780182fd4722c
SHA25679a81117ea64cccd640612fb650ede1f38f73c9920113dee9aaebcebd798df33
SHA5120c41a8de79158bf3ad03fb2805c80eca13fa68d60a7976ca931d57602aa98d902f336077fdc41e3c12656b66eeadf1435514ff4e9b315be773183c0a3ea9a639
-
C:\Users\Admin\AppData\Local\Temp\HD_X.datFilesize
1.3MB
MD5dc42ba3e87180c9dc0f9bd8536522d52
SHA1a7f14ac9f1d26f160923ea3994a56a3496c82591
SHA2568dc6372b9d017250fbd3b4a92c858b1805b7a0e7894f24fa35290230772c002b
SHA51257fc2e9929ef779ce2ab4b9662a54f62d64829507b3856528652ad095c35eddfb9067cd5ad2c26dcb8cc693c187acc2523290d98cfff81eaf9a0c1a04d7cdb38
-
C:\Users\Admin\AppData\Local\Temp\HD_ac4558730e985a2159e4a5ae6beef8f1c6741c166872b460a17411a4512a8c4f.exeFilesize
1.2MB
MD5d06c3ec17437ae4c3e16ba515bfe10d2
SHA13ca62741ef2935e987c81b8a7227b29d7bcd453b
SHA256f7bd9c1c013e111fe7963b4a9c7af1bce47945706fc2ece1e0b7c3906d8b900a
SHA5128f75c047113ad97f7d3221a9e230b89ebd675c47ae426e717b4e04be9a7fed0074ca296abc4830fdfaa8d35630a4eb68574317f37c451c9153d1cba270e63df2
-
C:\Users\Admin\AppData\Local\Temp\RCXCCA7.tmpFilesize
1.3MB
MD5bb7bc19498ea4b6441d42ee88a86362f
SHA1468de8c668d98af8eef416e678692051204cdae6
SHA2563814c81c99e4db4a3aaace4b52dbecba712ce9008113c3b2aa0c29e85c63a5ea
SHA512feb40af8a4da43702acec9ac42445ff45112b5e06135eac766c957ed6673780f954ac30c8b1fb39ea748a545bd86be70a6cd8193693454c045e291ad3fe97d71
-
C:\Users\Admin\AppData\Local\Temp\RVN.exeFilesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
C:\Users\Admin\AppData\Local\Temp\X.icoFilesize
69KB
MD5e33fb6d686b1a8b171349572c5a33f67
SHA129f24fe536adf799b69b63c83efadc1bce457a54
SHA256020c8e0963f89f4b14538b7d69e83c6fec44a29bbbd52fbb6deb2be5c697f450
SHA512cf1f1d6a9efe53f84e5b4a8246b87c0b96496716605d1b00352d9aae30e664d3d2cbadebf598b4e690a9feef0b5785887a4e643cc5f68938ca744af1d3539e55
-
memory/3300-27-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/3300-15-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/3300-17-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/3300-13-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/3300-16-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/4612-33-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/4612-30-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/4612-31-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/4612-37-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/4896-21-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/4896-8-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/4896-7-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/4896-6-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/4896-4-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB