Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe
Resource
win7-20240220-en
General
-
Target
27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe
-
Size
2.7MB
-
MD5
3286b1c9f5dd396fefa0632511dece15
-
SHA1
ac4eed514916ff86b6a2a29535d987e94f023942
-
SHA256
27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa
-
SHA512
ca40d1ef1f8d03b85a0b36ed9089293ceb7eac31d9f3b769cae50f475829cc9fea71c11644a74907ff539b70e510f2fa4efba4e53dc2397b58faecab553fee7c
-
SSDEEP
49152:YCwsbCANnKXferL7Vwe/Gg0P+WhBan2a4R3Uw:zws2ANnKXOaeOgmhBan2a4P
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2620-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2620-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2504-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2504-49-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2504-57-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/files/0x003000000001233b-6.dat family_gh0strat behavioral1/memory/2620-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2620-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2504-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2504-49-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2504-57-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\259391738.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
pid Process 2856 R.exe 2620 N.exe 2540 TXPlatfor.exe 2504 TXPlatfor.exe 2288 HD_27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 1364 Remote Data.exe -
Loads dropped DLL 16 IoCs
pid Process 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 2856 R.exe 2972 svchost.exe 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 2540 TXPlatfor.exe 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2972 svchost.exe 1364 Remote Data.exe -
resource yara_rule behavioral1/memory/2620-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2620-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2620-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2504-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2504-49-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2504-57-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\259391738.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2464 2288 WerFault.exe 36 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2156 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2504 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2620 N.exe Token: SeLoadDriverPrivilege 2504 TXPlatfor.exe Token: 33 2504 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2504 TXPlatfor.exe Token: 33 2504 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2504 TXPlatfor.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2856 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 28 PID 1664 wrote to memory of 2856 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 28 PID 1664 wrote to memory of 2856 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 28 PID 1664 wrote to memory of 2856 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 28 PID 1664 wrote to memory of 2620 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 31 PID 1664 wrote to memory of 2620 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 31 PID 1664 wrote to memory of 2620 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 31 PID 1664 wrote to memory of 2620 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 31 PID 1664 wrote to memory of 2620 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 31 PID 1664 wrote to memory of 2620 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 31 PID 1664 wrote to memory of 2620 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 31 PID 2620 wrote to memory of 2448 2620 N.exe 33 PID 2620 wrote to memory of 2448 2620 N.exe 33 PID 2620 wrote to memory of 2448 2620 N.exe 33 PID 2620 wrote to memory of 2448 2620 N.exe 33 PID 2540 wrote to memory of 2504 2540 TXPlatfor.exe 35 PID 2540 wrote to memory of 2504 2540 TXPlatfor.exe 35 PID 2540 wrote to memory of 2504 2540 TXPlatfor.exe 35 PID 2540 wrote to memory of 2504 2540 TXPlatfor.exe 35 PID 2540 wrote to memory of 2504 2540 TXPlatfor.exe 35 PID 2540 wrote to memory of 2504 2540 TXPlatfor.exe 35 PID 2540 wrote to memory of 2504 2540 TXPlatfor.exe 35 PID 1664 wrote to memory of 2288 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 36 PID 1664 wrote to memory of 2288 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 36 PID 1664 wrote to memory of 2288 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 36 PID 1664 wrote to memory of 2288 1664 27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 36 PID 2288 wrote to memory of 2464 2288 HD_27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 37 PID 2288 wrote to memory of 2464 2288 HD_27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 37 PID 2288 wrote to memory of 2464 2288 HD_27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 37 PID 2288 wrote to memory of 2464 2288 HD_27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe 37 PID 2448 wrote to memory of 2156 2448 cmd.exe 38 PID 2448 wrote to memory of 2156 2448 cmd.exe 38 PID 2448 wrote to memory of 2156 2448 cmd.exe 38 PID 2448 wrote to memory of 2156 2448 cmd.exe 38 PID 2972 wrote to memory of 1364 2972 svchost.exe 39 PID 2972 wrote to memory of 1364 2972 svchost.exe 39 PID 2972 wrote to memory of 1364 2972 svchost.exe 39 PID 2972 wrote to memory of 1364 2972 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe"C:\Users\Admin\AppData\Local\Temp\27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exeC:\Users\Admin\AppData\Local\Temp\HD_27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 883⤵
- Loads dropped DLL
- Program crash
PID:2464
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:3048
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\259391738.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1364
-
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5baca6f8b6a0097ec6955909b1a4deff4
SHA10796ff7210d1a6bce75332901bf0de7ba976f69a
SHA25633338af390cbff7fd52e5a8d04b9afc5fd36130c60c454a5cb65bc44f1fb4dd2
SHA5126846abae2cfbc0aadc65c36f65e074328c047150823eebe26966562164ce08c7a835c4d622d58f08e034ba0fb1ecbb92543a1269e813a3cceacbadff23c830c5
-
\Users\Admin\AppData\Local\Temp\HD_27a65042e1d87702f9e979fcf17af460500719fe9b0ff711bd149f0565c238fa.exe
Filesize241KB
MD58fc872149f0b8d2fb3d75c4076c0a8ca
SHA1d31cf6784649d805f7a994c9e9b72ffb2e1920dc
SHA256869448b4fcd15473fe4fdc9dbbf05fcfa154b854231cce94858b4bd7b196c13a
SHA51277a225866574c2ae296e61db1aefd193d5766a1df0e5b36c7bac657958bdfdc7ccfff85fe2b3e7ccbbdb482ee82b1fabc753042494b16be0df74ea96d87e65c6
-
Filesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
Filesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
Filesize
899KB
MD57de205f195ef29cd359eb618baaea7ff
SHA194505db7f9bfe15b7dcb390999934768715fc4b1
SHA2563f4465ffc00684119de1c44f01a770e7c0614fb2aa51b9f95cfadf9740cc8f57
SHA512030aad39b1a901e2a2f9e189c66c55d22242dc3773cd41339ec6e31eb374ba1cdcf3c36620329183580aad27a7933b077b367cb4efd7df65a05b0707b4cef1be
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d