Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe
Resource
win7-20240221-en
General
-
Target
76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe
-
Size
2.4MB
-
MD5
97b2cd43e35844b74d95664664e5743d
-
SHA1
7e61b61ff2a94ef345dc7404090c3ca264026b71
-
SHA256
76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c
-
SHA512
3bb089759974851509fc29a07f49651790bc2fdbb6488c036bc2632085d1a84c5e0fe09b6adeaf23e60a5ee581289f8e9e879a76d3bdbf4e48ea6c3fec7ee46b
-
SSDEEP
49152:LQZAdVyVT9n/Gg0P+WhoLJDmn250YZZuOC:cGdVyVT9nOgmhWJDmn250YZZuT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2564-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2564-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2564-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3484-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3484-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3484-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/808-41-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/808-47-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/808-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/808-58-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3484-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
resource yara_rule behavioral2/memory/2564-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2564-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2564-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3484-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3484-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3484-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x000700000002340c-30.dat family_gh0strat behavioral2/memory/808-41-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/808-47-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/808-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/808-58-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3484-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240603765.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
pid Process 2564 svchost.exe 3484 TXPlatforn.exe 1048 svchos.exe 808 TXPlatforn.exe 2596 HD_76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 3108 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
pid Process 1048 svchos.exe 2964 svchost.exe 3108 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
resource yara_rule behavioral2/memory/2564-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2564-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2564-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2564-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3484-14-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3484-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3484-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3484-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/808-41-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/808-47-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/808-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/808-58-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3484-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240603765.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2236 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 808 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2564 svchost.exe Token: SeLoadDriverPrivilege 808 TXPlatforn.exe Token: 33 808 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 808 TXPlatforn.exe Token: 33 808 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 808 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2564 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 80 PID 4496 wrote to memory of 2564 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 80 PID 4496 wrote to memory of 2564 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 80 PID 2564 wrote to memory of 680 2564 svchost.exe 82 PID 2564 wrote to memory of 680 2564 svchost.exe 82 PID 2564 wrote to memory of 680 2564 svchost.exe 82 PID 4496 wrote to memory of 1048 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 83 PID 4496 wrote to memory of 1048 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 83 PID 4496 wrote to memory of 1048 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 83 PID 3484 wrote to memory of 808 3484 TXPlatforn.exe 84 PID 3484 wrote to memory of 808 3484 TXPlatforn.exe 84 PID 3484 wrote to memory of 808 3484 TXPlatforn.exe 84 PID 4496 wrote to memory of 2596 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 87 PID 4496 wrote to memory of 2596 4496 76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe 87 PID 680 wrote to memory of 2236 680 cmd.exe 89 PID 680 wrote to memory of 2236 680 cmd.exe 89 PID 680 wrote to memory of 2236 680 cmd.exe 89 PID 2964 wrote to memory of 3108 2964 svchost.exe 90 PID 2964 wrote to memory of 3108 2964 svchost.exe 90 PID 2964 wrote to memory of 3108 2964 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe"C:\Users\Admin\AppData\Local\Temp\76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\HD_76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exeC:\Users\Admin\AppData\Local\Temp\HD_76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe2⤵
- Executes dropped EXE
PID:2596
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:2264
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240603765.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_76a42514cb9a06f55a454b460eb2eb19e91bcd2321a0171a1c76a63e5035401c.exe
Filesize811KB
MD5f228b7a47e44aeec9954bbd55bc37bc8
SHA16f1f946e47b1a351265e1a4cce8f44c3e5fd0ac0
SHA256de4c33fb5429481b5c73137b78680e3e8644bbbad61fffed0ed3ecba6577a088
SHA51248ce98cf7cb86199feecb6a2a4a36bb36146dda50bbab848f33958673d0fd5b1e86d74296f6457599dfe7b53cae8941bd192fe7aa472514a520911e1ac02b556
-
Filesize
1.6MB
MD56d3f04529c14e407ef5f6c687b3b023d
SHA150c45abdc66e646092534a525ce37c377891f44e
SHA256a4c9a9270f7625f7b15913c7e2eb0647a6c5e42ed763760c68c40159ab43e42e
SHA512ace3bde8ce932d3c71ba189c2c470d64bc96d9a8cf38cb3484019c35a767e958e04baebbd272d7f5c7eae5abf12ea3b3be38282522d1d9a72335514a19f0eaef
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5ff4d49089f777e0547fdafe1d054d9bb
SHA12eeeace48e3c72a72f0f71e1b6ac1f91d530275a
SHA256d057cb4e2d4ae8f8f04113049f46209eddbfbbc3d718f179fe58c8dc8610a480
SHA512d2226cc8da2e89ef3885ad19bac76d95ed935a588b41716b47e0d0bef138d4b40a8efac2d88246b4c0d51f8e03c05a021b89d7d064fd0a033da2aafbf71fc967
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641