Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 13:25
Static task
static1
Behavioral task
behavioral1
Sample
71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe
Resource
win7-20240508-en
General
-
Target
71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe
-
Size
1.3MB
-
MD5
6996bfa800002c285e70a74bd8006386
-
SHA1
7fd66b9aa8613e0820b261c41b9098e4d6b3099a
-
SHA256
71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd
-
SHA512
2d5fadfcf065aa3da21f63b3012098f7c80fdf817aa61827eb7723d2c05ab8ba923a4f99c981032fa9baf0582f871a9e6456709d1c56572433303a557c3326aa
-
SSDEEP
24576:BQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVqXXiIi:BQZAdVyVT9n/Gg0P+WhoJXXi5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1428-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1428-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1428-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1696-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1696-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1696-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2604-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1696-26-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2604-33-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2604-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2604-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
resource yara_rule behavioral2/memory/1428-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1428-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1428-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1696-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1696-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1696-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x000700000002341e-29.dat family_gh0strat behavioral2/memory/2604-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1696-26-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2604-33-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2604-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2604-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 5 IoCs
pid Process 1428 svchost.exe 1696 TXPlatforn.exe 2604 TXPlatforn.exe 2396 svchos.exe 2320 HD_71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe -
Loads dropped DLL 1 IoCs
pid Process 2396 svchos.exe -
resource yara_rule behavioral2/memory/1428-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1428-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1428-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1428-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1696-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1696-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1696-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2604-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1696-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1696-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2604-33-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2604-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2604-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240605031.txt svchos.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4344 2396 WerFault.exe 85 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1520 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2604 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1428 svchost.exe Token: SeLoadDriverPrivilege 2604 TXPlatforn.exe Token: 33 2604 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2604 TXPlatforn.exe Token: 33 2604 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2604 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4780 wrote to memory of 1428 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 81 PID 4780 wrote to memory of 1428 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 81 PID 4780 wrote to memory of 1428 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 81 PID 1428 wrote to memory of 1192 1428 svchost.exe 83 PID 1428 wrote to memory of 1192 1428 svchost.exe 83 PID 1428 wrote to memory of 1192 1428 svchost.exe 83 PID 1696 wrote to memory of 2604 1696 TXPlatforn.exe 84 PID 1696 wrote to memory of 2604 1696 TXPlatforn.exe 84 PID 1696 wrote to memory of 2604 1696 TXPlatforn.exe 84 PID 4780 wrote to memory of 2396 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 85 PID 4780 wrote to memory of 2396 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 85 PID 4780 wrote to memory of 2396 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 85 PID 1192 wrote to memory of 1520 1192 cmd.exe 90 PID 1192 wrote to memory of 1520 1192 cmd.exe 90 PID 1192 wrote to memory of 1520 1192 cmd.exe 90 PID 4780 wrote to memory of 2320 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 91 PID 4780 wrote to memory of 2320 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 91 PID 4780 wrote to memory of 2320 4780 71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe"C:\Users\Admin\AppData\Local\Temp\71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:1520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 4443⤵
- Program crash
PID:4344
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exeC:\Users\Admin\AppData\Local\Temp\HD_71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe2⤵
- Executes dropped EXE
PID:2320
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2396 -ip 23961⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_71a26cabc062f3e0248a8bf254f1315b5d75d4f65e961ab1dfe668e8d78242bd.exe
Filesize57KB
MD5602f9afcb563002689111e320b893794
SHA1075ba1a0696e3a3571ac14e2a7df3f7895f6e0f7
SHA2560de8a0d6ae85d2686d55f0dcf2cf999b7e913bf1d644368c9114b1d9c4438bab
SHA512d8e1d4b7bdd27c10c65e46df6f451b6256d5b284215d2a24060b0c2281dfe5a95bcbe5eb789ec1afbce8d814aac93ff897a0b3f734d48aaebc7ef606324ce7cf
-
Filesize
1.2MB
MD50c2203c3d6028ac32b39799ec237cb11
SHA1f9335e51a3ee4c1bf719057960040386cd55e6b8
SHA256f05679b4b774e9960fbd4f10cbf901164a4b7e5a2637da0dd78f92039d12ab20
SHA512efa1684c9a2ac426a85bf9a45b5b535f0dece8ef96e4934079d20312f60c9e6f4fda9536dfd837308bc51b17834336395ba5d52b01ba8e8c645334a6ff115832
-
Filesize
1.3MB
MD5e89488f62286a3fb7fcfb8a084f017d5
SHA1938d317d5f687e08ec71967552e683ffb6fade04
SHA2560dd2267a199775c7e1031bfb70aa92ae6237057d563446b483de080943da2ef4
SHA512b5887a0e1e6263e2751b6ef9ca0486918c2227a625bbc2df28627ac94f0168f0133ab66510272273f8dffe9dbbce0a1b1ffaccc6d383d08c308027bb94535919
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD517188df1f196f979a9ea38743403627e
SHA104ed00213fcde49ce7e0c7776df04fe81609e21c
SHA25674c99c76c39b560e7b6b19cd79d24a75a42eb585198e4863561c62d1b16b5edc
SHA5124782fe765e41cdbf5eb5b5c6643e5a878899b832e92696f227cd5529d16c91ddb1068fa57ac74e23e79979ff8dc7281bb19a93f6a0ff4b9e02ef2f689f3bb954