Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe
Resource
win7-20240611-en
General
-
Target
ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe
-
Size
6.8MB
-
MD5
be07f26c587ea4ed7eb878b92d4bde44
-
SHA1
4a1f9ed1b477b1ba5e30981df5b5066e1a4a8598
-
SHA256
ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef
-
SHA512
7aa742eacb7babb950cfe858563b1b32a16b95dcadb13936b9a965a66a047dc753bcc334d6e39f00a18fe51a77cd59cb7d6efda0a2f47d1e9004bc1c93f728b9
-
SSDEEP
98304:6GdVyVT9nOgmhIvluvC6vTtIWikAa4pHPOnFR9UiYBaQQBj1OKX+JN+QriS:JWT9nO72YfTtVikUpvriV5X+JNNb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2156-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2156-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2156-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/3052-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/3052-34-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2840-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2840-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2840-45-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2156-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2156-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2156-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/3052-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/files/0x00080000000147d5-27.dat family_gh0strat behavioral1/memory/3052-34-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2840-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2840-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2840-45-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\259423266.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
pid Process 2156 svchost.exe 3052 TXPlatforn.exe 2736 svchos.exe 2840 TXPlatforn.exe 1440 HD_ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 2576 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 15 IoCs
pid Process 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 3052 TXPlatforn.exe 2736 svchos.exe 2792 svchost.exe 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 2792 svchost.exe 2576 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe 2936 WerFault.exe -
resource yara_rule behavioral1/memory/2156-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2156-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2156-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2156-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/3052-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/3052-34-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2840-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2840-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2840-45-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\259423266.txt svchos.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2936 1440 WerFault.exe 37 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2764 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2840 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2156 svchost.exe Token: SeLoadDriverPrivilege 2840 TXPlatforn.exe Token: 33 2840 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2840 TXPlatforn.exe Token: 33 2840 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2840 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2156 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 28 PID 3032 wrote to memory of 2156 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 28 PID 3032 wrote to memory of 2156 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 28 PID 3032 wrote to memory of 2156 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 28 PID 3032 wrote to memory of 2156 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 28 PID 3032 wrote to memory of 2156 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 28 PID 3032 wrote to memory of 2156 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 28 PID 2156 wrote to memory of 2704 2156 svchost.exe 30 PID 2156 wrote to memory of 2704 2156 svchost.exe 30 PID 2156 wrote to memory of 2704 2156 svchost.exe 30 PID 2156 wrote to memory of 2704 2156 svchost.exe 30 PID 3032 wrote to memory of 2736 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 32 PID 3032 wrote to memory of 2736 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 32 PID 3032 wrote to memory of 2736 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 32 PID 3032 wrote to memory of 2736 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 32 PID 3052 wrote to memory of 2840 3052 TXPlatforn.exe 33 PID 3052 wrote to memory of 2840 3052 TXPlatforn.exe 33 PID 3052 wrote to memory of 2840 3052 TXPlatforn.exe 33 PID 3052 wrote to memory of 2840 3052 TXPlatforn.exe 33 PID 3052 wrote to memory of 2840 3052 TXPlatforn.exe 33 PID 3052 wrote to memory of 2840 3052 TXPlatforn.exe 33 PID 3052 wrote to memory of 2840 3052 TXPlatforn.exe 33 PID 2704 wrote to memory of 2764 2704 cmd.exe 34 PID 2704 wrote to memory of 2764 2704 cmd.exe 34 PID 2704 wrote to memory of 2764 2704 cmd.exe 34 PID 2704 wrote to memory of 2764 2704 cmd.exe 34 PID 3032 wrote to memory of 1440 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 37 PID 3032 wrote to memory of 1440 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 37 PID 3032 wrote to memory of 1440 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 37 PID 3032 wrote to memory of 1440 3032 ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 37 PID 2792 wrote to memory of 2576 2792 svchost.exe 38 PID 2792 wrote to memory of 2576 2792 svchost.exe 38 PID 2792 wrote to memory of 2576 2792 svchost.exe 38 PID 2792 wrote to memory of 2576 2792 svchost.exe 38 PID 1440 wrote to memory of 2936 1440 HD_ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 39 PID 1440 wrote to memory of 2936 1440 HD_ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 39 PID 1440 wrote to memory of 2936 1440 HD_ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 39 PID 1440 wrote to memory of 2936 1440 HD_ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe"C:\Users\Admin\AppData\Local\Temp\ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\HD_ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exeC:\Users\Admin\AppData\Local\Temp\HD_ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 5323⤵
- Loads dropped DLL
- Program crash
PID:2936
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:2540
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\259423266.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5379ab9dc2802f9e035b6f5be9e6d4cf9
SHA144ba34ac79735724f6bb8dd7859aa0b4dac7d6a8
SHA256a7784192a2f579d4314a7de363c9ead96d938b2587e69c5a1fe2cab2fedd5688
SHA5129438af92b1195234bb3120d42de7dfd04ceef7e0c7d59cd07b295f9614486f0f6c7bad46fadb5ec20fe5384382709dc950ff7304e76fa0b03c5203fd416f9c1f
-
\Users\Admin\AppData\Local\Temp\HD_ee4f9af87312996d3c64829c6b3823eb6c6d02b17776a46cfbb605f27e697aef.exe
Filesize5.1MB
MD54e507c0477d358956140c16cbfce2b44
SHA1c79e27ccfffac32142b90a02cc14da2142255053
SHA25623508a588f72ac0d8db13d867b10e47ade28480d7aa9869e362e86d48dd1a3e2
SHA51241c8f5a996a975f9db43704d137f94de6b7303d291f7e665e9f14810a12e015de07aaf3797b631df349fca6ff14bc06dfeb9a46864684c02fde609ad4feab7ed
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD543f47d1708bc6f660419924c9f33e641
SHA194d20cad399c167506c2f9effc967ec04bbb814a
SHA2563eae7a952de59b504a8066f456e221eea4753c3ec47a517fd0b8bdd0f35e9131
SHA512029c8953c2d110788aa5f5f866a924ded3e29c01cc4991e20b7034a63ff1a5f86ccbe3e17c8ecffff9622367b7899a19a8abc2b6025e911b5ba9a00d4f8ece34
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d