Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe
Resource
win7-20240508-en
General
-
Target
71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe
-
Size
1.3MB
-
MD5
6996bfa800002c285e70a74bd8006386
-
SHA1
7fd66b9aa8613e0820b261c41b9098e4d6b3099a
-
SHA256
71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd
-
SHA512
2d5fadfcf065aa3da21f63b3012098f7c80fdf817aa61827eb7723d2c05ab8ba923a4f99c981032fa9baf0582f871a9e6456709d1c56572433303a557c3326aa
-
SSDEEP
24576:BQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVqXXiIi:BQZAdVyVT9n/Gg0P+WhoJXXi5
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2188-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2188-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2188-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2664-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2188-24-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2628-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2664-33-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2628-34-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2628-39-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2628-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral1/memory/2188-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2188-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2188-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2664-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2188-24-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2628-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2664-33-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2628-34-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2628-39-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/files/0x0009000000013a76-37.dat family_gh0strat behavioral1/memory/2628-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\259396762.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
pid Process 2188 svchost.exe 2664 TXPlatforn.exe 2684 svchos.exe 2628 TXPlatforn.exe 2544 HD_71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 1736 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 8 IoCs
pid Process 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 2664 TXPlatforn.exe 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 2684 svchos.exe 2172 svchost.exe 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 2172 svchost.exe 1736 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
resource yara_rule behavioral1/memory/2188-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2188-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2188-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2188-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2664-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2188-24-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2628-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2664-33-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2628-34-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2628-39-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2628-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\259396762.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2504 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2628 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2188 svchost.exe Token: SeLoadDriverPrivilege 2628 TXPlatforn.exe Token: 33 2628 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2628 TXPlatforn.exe Token: 33 2628 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2628 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2188 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 28 PID 1492 wrote to memory of 2188 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 28 PID 1492 wrote to memory of 2188 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 28 PID 1492 wrote to memory of 2188 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 28 PID 1492 wrote to memory of 2188 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 28 PID 1492 wrote to memory of 2188 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 28 PID 1492 wrote to memory of 2188 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 28 PID 2188 wrote to memory of 2616 2188 svchost.exe 30 PID 2188 wrote to memory of 2616 2188 svchost.exe 30 PID 2188 wrote to memory of 2616 2188 svchost.exe 30 PID 2188 wrote to memory of 2616 2188 svchost.exe 30 PID 2664 wrote to memory of 2628 2664 TXPlatforn.exe 31 PID 2664 wrote to memory of 2628 2664 TXPlatforn.exe 31 PID 2664 wrote to memory of 2628 2664 TXPlatforn.exe 31 PID 2664 wrote to memory of 2628 2664 TXPlatforn.exe 31 PID 2664 wrote to memory of 2628 2664 TXPlatforn.exe 31 PID 2664 wrote to memory of 2628 2664 TXPlatforn.exe 31 PID 2664 wrote to memory of 2628 2664 TXPlatforn.exe 31 PID 1492 wrote to memory of 2684 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 32 PID 1492 wrote to memory of 2684 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 32 PID 1492 wrote to memory of 2684 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 32 PID 1492 wrote to memory of 2684 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 32 PID 2616 wrote to memory of 2504 2616 cmd.exe 34 PID 2616 wrote to memory of 2504 2616 cmd.exe 34 PID 2616 wrote to memory of 2504 2616 cmd.exe 34 PID 2616 wrote to memory of 2504 2616 cmd.exe 34 PID 1492 wrote to memory of 2544 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 37 PID 1492 wrote to memory of 2544 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 37 PID 1492 wrote to memory of 2544 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 37 PID 1492 wrote to memory of 2544 1492 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 37 PID 2172 wrote to memory of 1736 2172 svchost.exe 38 PID 2172 wrote to memory of 1736 2172 svchost.exe 38 PID 2172 wrote to memory of 1736 2172 svchost.exe 38 PID 2172 wrote to memory of 1736 2172 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe"C:\Users\Admin\AppData\Local\Temp\71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\HD_71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exeC:\Users\Admin\AppData\Local\Temp\HD_71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe2⤵
- Executes dropped EXE
PID:2544
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:2652
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\259396762.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe
Filesize57KB
MD5602f9afcb563002689111e320b893794
SHA1075ba1a0696e3a3571ac14e2a7df3f7895f6e0f7
SHA2560de8a0d6ae85d2686d55f0dcf2cf999b7e913bf1d644368c9114b1d9c4438bab
SHA512d8e1d4b7bdd27c10c65e46df6f451b6256d5b284215d2a24060b0c2281dfe5a95bcbe5eb789ec1afbce8d814aac93ff897a0b3f734d48aaebc7ef606324ce7cf
-
Filesize
1.2MB
MD50c2203c3d6028ac32b39799ec237cb11
SHA1f9335e51a3ee4c1bf719057960040386cd55e6b8
SHA256f05679b4b774e9960fbd4f10cbf901164a4b7e5a2637da0dd78f92039d12ab20
SHA512efa1684c9a2ac426a85bf9a45b5b535f0dece8ef96e4934079d20312f60c9e6f4fda9536dfd837308bc51b17834336395ba5d52b01ba8e8c645334a6ff115832
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD517188df1f196f979a9ea38743403627e
SHA104ed00213fcde49ce7e0c7776df04fe81609e21c
SHA25674c99c76c39b560e7b6b19cd79d24a75a42eb585198e4863561c62d1b16b5edc
SHA5124782fe765e41cdbf5eb5b5c6643e5a878899b832e92696f227cd5529d16c91ddb1068fa57ac74e23e79979ff8dc7281bb19a93f6a0ff4b9e02ef2f689f3bb954
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d