Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 09:28
Static task
static1
Behavioral task
behavioral1
Sample
89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe
Resource
win7-20240508-en
General
-
Target
89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe
-
Size
6.0MB
-
MD5
210c175429b7050ef44fe3dd3f9371b3
-
SHA1
d4e455040a6ee114a16aeacf00a25260e222f863
-
SHA256
89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c
-
SHA512
6dd192975fd38bb3fda9f111d4ac69acd27a2505ff523f660549aa2c26fd2c4330e76c581bb0f0d38dc7c119916498f74e7fa4f637ac8964ba6dc0fa7bb2366f
-
SSDEEP
196608:8KXbeO7qb0qiYJPgFP67XX4DEMu6MBRA:97q4zIweA
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4728-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4728-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4728-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3928-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3928-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4728-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3372-41-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3372-44-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3372-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral2/files/0x0008000000023405-5.dat family_gh0strat behavioral2/memory/4728-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4728-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4728-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3928-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3928-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4728-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3372-41-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3372-44-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3372-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\240600078.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
pid Process 3880 R.exe 4728 N.exe 3928 TXPlatfor.exe 3372 TXPlatfor.exe 4376 HD_89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 1620 Remote Data.exe -
Loads dropped DLL 3 IoCs
pid Process 3880 R.exe 1604 svchost.exe 1620 Remote Data.exe -
resource yara_rule behavioral2/memory/4728-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4728-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4728-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4728-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3928-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3928-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3928-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4728-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3372-41-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3372-44-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3372-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\240600078.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6100 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3372 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4728 N.exe Token: SeLoadDriverPrivilege 3372 TXPlatfor.exe Token: 33 3372 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 3372 TXPlatfor.exe Token: 33 3372 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 3372 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3880 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 81 PID 2156 wrote to memory of 3880 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 81 PID 2156 wrote to memory of 3880 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 81 PID 2156 wrote to memory of 4728 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 84 PID 2156 wrote to memory of 4728 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 84 PID 2156 wrote to memory of 4728 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 84 PID 4728 wrote to memory of 5188 4728 N.exe 86 PID 4728 wrote to memory of 5188 4728 N.exe 86 PID 4728 wrote to memory of 5188 4728 N.exe 86 PID 3928 wrote to memory of 3372 3928 TXPlatfor.exe 88 PID 3928 wrote to memory of 3372 3928 TXPlatfor.exe 88 PID 3928 wrote to memory of 3372 3928 TXPlatfor.exe 88 PID 2156 wrote to memory of 4376 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 89 PID 2156 wrote to memory of 4376 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 89 PID 2156 wrote to memory of 4376 2156 89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe 89 PID 5188 wrote to memory of 6100 5188 cmd.exe 90 PID 5188 wrote to memory of 6100 5188 cmd.exe 90 PID 5188 wrote to memory of 6100 5188 cmd.exe 90 PID 1604 wrote to memory of 1620 1604 svchost.exe 91 PID 1604 wrote to memory of 1620 1604 svchost.exe 91 PID 1604 wrote to memory of 1620 1604 svchost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe"C:\Users\Admin\AppData\Local\Temp\89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:5188 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:6100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exeC:\Users\Admin\AppData\Local\Temp\HD_89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe2⤵
- Executes dropped EXE
PID:4376
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:3044
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\240600078.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_89e5a37a547b36953497d471d212fa2de02405986acf9cf7f3e72ca4a8e32b5c.exe
Filesize3.5MB
MD5d3aa0c5c865fc39187f3b848fd4e4d76
SHA16b0ee4ad773141640bbf7e3b1188b3eea1f235ba
SHA256e1511201ec2ae9a7e30259f04bc2ec7272badb2574a2e9b405d0e916ae5c082c
SHA512cc20c1558d0f179e735c347593ac8f691c0a047795e88bca7b5d7cb533b4f9046343e71e5478ca241a530801ceb3498e6316b9b39cbb47b70f2130cc1c1a06cc
-
Filesize
2.5MB
MD5122c751ce3618a7794c195cdbf379e7c
SHA15175a4d31fdcd79b9112e72dd2c3313161c30d4a
SHA256ff75630d36b8547e9c5afa611c4b977592ffe253242e850d7b761f8b160a1cb4
SHA512cd0beb882691572b11e8d2f37ae5361867ab2afba44fe071c85959d7faec8048cac99da43fa949668bced2c45ad2e8d3035417b1b5c025ad47233dddae92dd8e
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
899KB
MD589b099fa19e236cfb0bab76a17cd9a18
SHA11e5afe81420662a67f40c2a5c9200f80c999d9a5
SHA256a4019a12ec40b70503e086779a8e176c86e49c6b8d6a42bbb453b346b43bf5a4
SHA512b4c1e94d61f8bbc8c10d192da1e197a1a380e61b50132823523a4b2ac19446e44904e0c773250e05293cc97165085854e0897070bcb32a206f7c18b7cfccaab2
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641