Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe
Resource
win7-20240508-en
General
-
Target
fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe
-
Size
6.7MB
-
MD5
778c0eda06b531eb5a5f862114a7d111
-
SHA1
4a0a7b1a225bbf15449647a6666dccb756f4b417
-
SHA256
fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad
-
SHA512
168ec70476b01c80979685b66576a2803e82667b75210612c6efed2b9475de2b9f65150588ee88afa44152a60bcf1bd1cb274fd8c6f07f02065070efd0b44499
-
SSDEEP
98304:lGdVyVT9nOgmhUXXEgUvUTHc8eVuuquRNREHp/0rSKsAv:SWT9nO76X5JEN6J+t
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4312-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4312-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4312-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4788-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4788-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4788-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3092-36-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3092-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4788-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3092-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3092-39-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3092-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3092-47-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 14 IoCs
resource yara_rule behavioral2/memory/4312-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4312-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4312-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4788-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4788-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4788-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023405-25.dat family_gh0strat behavioral2/memory/3092-36-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3092-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4788-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3092-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3092-39-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3092-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3092-47-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240599890.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
pid Process 4312 svchost.exe 4788 TXPlatforn.exe 3092 TXPlatforn.exe 3636 svchos.exe 60 HD_fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 1624 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
pid Process 3636 svchos.exe 2892 svchost.exe 1624 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
resource yara_rule behavioral2/memory/4312-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4312-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4312-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4312-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4788-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4788-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4788-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3092-36-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3092-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4788-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4788-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3092-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3092-39-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3092-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3092-47-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240599890.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3316 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 3092 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4312 svchost.exe Token: SeLoadDriverPrivilege 3092 TXPlatforn.exe Token: 33 3092 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3092 TXPlatforn.exe Token: 33 3092 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3092 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2092 wrote to memory of 4312 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 81 PID 2092 wrote to memory of 4312 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 81 PID 2092 wrote to memory of 4312 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 81 PID 4788 wrote to memory of 3092 4788 TXPlatforn.exe 84 PID 4788 wrote to memory of 3092 4788 TXPlatforn.exe 84 PID 4788 wrote to memory of 3092 4788 TXPlatforn.exe 84 PID 4312 wrote to memory of 4596 4312 svchost.exe 83 PID 4312 wrote to memory of 4596 4312 svchost.exe 83 PID 4312 wrote to memory of 4596 4312 svchost.exe 83 PID 2092 wrote to memory of 3636 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 85 PID 2092 wrote to memory of 3636 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 85 PID 2092 wrote to memory of 3636 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 85 PID 4596 wrote to memory of 3316 4596 cmd.exe 89 PID 4596 wrote to memory of 3316 4596 cmd.exe 89 PID 4596 wrote to memory of 3316 4596 cmd.exe 89 PID 2092 wrote to memory of 60 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 90 PID 2092 wrote to memory of 60 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 90 PID 2092 wrote to memory of 60 2092 fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe 90 PID 2892 wrote to memory of 1624 2892 svchost.exe 92 PID 2892 wrote to memory of 1624 2892 svchost.exe 92 PID 2892 wrote to memory of 1624 2892 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe"C:\Users\Admin\AppData\Local\Temp\fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:3316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\HD_fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exeC:\Users\Admin\AppData\Local\Temp\HD_fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe2⤵
- Executes dropped EXE
PID:60
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:2716
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240599890.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ea1f2cb9297b1f5f4d0d3020a68e14bf
SHA11df811aa2124f84e71d76d80d3a91c38f8bbafce
SHA256cde5f4518c91d4edfc9135f7a59ebe931b548f70a78ff75c5e46cc519c1ea6c6
SHA5120b6d01a8dd0da6f31cb34695cf4b01635fa869da0b67aea61dde1f3c988d9ddddbd5d7ea080b671f3401c770fb18bc89825d9945a0d08d3a4a8eec6ca6331c48
-
Filesize
1.6MB
MD543d11671e5272e7290bb247fe063c03c
SHA13b736bec0860e050b8c764ebcd8338a5335385fc
SHA256f0d63c2f30d5f539aef84b078f2a2cf571e62f04d1e87a80477d67b3c457ea1b
SHA512ee98648ecd1b2ef3344f1c432829da56900d7db53b4d717bcfef6cc2e5c293a39983403e7c3e27a087092ddc90e8b01f410a07a5e5ab74b8d405d41676a86027
-
C:\Users\Admin\AppData\Local\Temp\HD_fb8b6ddcba059053f32528f21b41704232fa0b78a14cf4ad3e8ce9482514abad.exe
Filesize5.4MB
MD56db3825895d83a9a1542ad2a003075b4
SHA1157c9dd069e7e3abe7574b96f30b4ba680729187
SHA2563081de5293c7ecbc018a6a4c79b5d319043c3c1e85dcfcf001fee6a740a91f39
SHA51204a0390d4d07f54ac1830dea74406c7b903cca9621b56612fd0cec139c839ee1d09be192a99f3f0afbecf46894bf49005bafe9705d0bc5ed21cd882439f37c7f
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD551ccac3b425e0d3e6c1c31320169b712
SHA137854889ef025d185bc1ed01e63f9372c210de95
SHA25608863d917b1ac09ef81b43c245c811a58a03dd46cb0737e6485e0ef4834d44ab
SHA512292017b57827b59e128438c2570302c90f62afc218aab3aa403092460630e82934bfdd6ec1f4859c7b280c7ee0ebc4c9687e120f745e293d171dd3d54b384ad7
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641