Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 15:45
Static task
static1
Behavioral task
behavioral1
Sample
6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe
Resource
win7-20240508-en
General
-
Target
6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe
-
Size
13.1MB
-
MD5
744fb0ab1ab83fd7314ad5e3ccca4545
-
SHA1
e371869e15d1f4d50e65276e08c0909f136f50cb
-
SHA256
6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d
-
SHA512
ac747b4235c22e441b7e3cd6e9ea1e102695ef104fd0c6f954cef53d83c91c4ec2f03c5134e8c2de63c16d7efa6ab01fb6057e3735f85c4a866b7c65bd70c23d
-
SSDEEP
393216:97kL8IGXGtMB5ONO+Rw6Ppx9bxN0XdIMOgC:JkAQGvOk36PpudIMHC
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
resource yara_rule behavioral1/memory/2544-89-0x0000000000400000-0x0000000002924000-memory.dmp family_blackmoon -
resource yara_rule behavioral1/memory/1608-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1608-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1608-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2096-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2096-26-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2676-31-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2676-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2676-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2676-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2676-45-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral1/memory/1608-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1608-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1608-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2096-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2096-26-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2676-31-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/files/0x00080000000165e1-33.dat family_gh0strat behavioral1/memory/2676-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2676-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2676-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2676-45-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\259400911.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
pid Process 1608 svchost.exe 2096 TXPlatforn.exe 2676 TXPlatforn.exe 2736 svchos.exe 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 768 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 13 IoCs
pid Process 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 2096 TXPlatforn.exe 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 2736 svchos.exe 2516 svchost.exe 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 2516 svchost.exe 768 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe -
resource yara_rule behavioral1/memory/1608-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1608-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1608-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1608-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2096-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2096-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2676-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2676-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2676-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2676-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2676-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2676-45-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\259400911.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2316 2544 WerFault.exe 37 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2608 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2676 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1608 svchost.exe Token: SeLoadDriverPrivilege 2676 TXPlatforn.exe Token: 33 2676 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2676 TXPlatforn.exe Token: 33 2676 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2676 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1608 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 28 PID 2056 wrote to memory of 1608 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 28 PID 2056 wrote to memory of 1608 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 28 PID 2056 wrote to memory of 1608 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 28 PID 2056 wrote to memory of 1608 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 28 PID 2056 wrote to memory of 1608 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 28 PID 2056 wrote to memory of 1608 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 28 PID 1608 wrote to memory of 2600 1608 svchost.exe 30 PID 1608 wrote to memory of 2600 1608 svchost.exe 30 PID 1608 wrote to memory of 2600 1608 svchost.exe 30 PID 1608 wrote to memory of 2600 1608 svchost.exe 30 PID 2096 wrote to memory of 2676 2096 TXPlatforn.exe 31 PID 2096 wrote to memory of 2676 2096 TXPlatforn.exe 31 PID 2096 wrote to memory of 2676 2096 TXPlatforn.exe 31 PID 2096 wrote to memory of 2676 2096 TXPlatforn.exe 31 PID 2096 wrote to memory of 2676 2096 TXPlatforn.exe 31 PID 2096 wrote to memory of 2676 2096 TXPlatforn.exe 31 PID 2096 wrote to memory of 2676 2096 TXPlatforn.exe 31 PID 2056 wrote to memory of 2736 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 32 PID 2056 wrote to memory of 2736 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 32 PID 2056 wrote to memory of 2736 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 32 PID 2056 wrote to memory of 2736 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 32 PID 2600 wrote to memory of 2608 2600 cmd.exe 35 PID 2600 wrote to memory of 2608 2600 cmd.exe 35 PID 2600 wrote to memory of 2608 2600 cmd.exe 35 PID 2600 wrote to memory of 2608 2600 cmd.exe 35 PID 2056 wrote to memory of 2544 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 37 PID 2056 wrote to memory of 2544 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 37 PID 2056 wrote to memory of 2544 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 37 PID 2056 wrote to memory of 2544 2056 6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 37 PID 2516 wrote to memory of 768 2516 svchost.exe 38 PID 2516 wrote to memory of 768 2516 svchost.exe 38 PID 2516 wrote to memory of 768 2516 svchost.exe 38 PID 2516 wrote to memory of 768 2516 svchost.exe 38 PID 2544 wrote to memory of 2316 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 39 PID 2544 wrote to memory of 2316 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 39 PID 2544 wrote to memory of 2316 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 39 PID 2544 wrote to memory of 2316 2544 HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe"C:\Users\Admin\AppData\Local\Temp\6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exeC:\Users\Admin\AppData\Local\Temp\HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 5763⤵
- Loads dropped DLL
- Program crash
PID:2316
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:2556
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\259400911.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_6ff30275eb0b6cfc2a7c9cb00cde2b9d1cccb0112d3c01285e98b0b541b1ea9d.exe
Filesize11.8MB
MD5703ba10e2e9df5de9e2cbfa6cf3e21a0
SHA1fa9d563dc1d438512bdb95e646723802c4045c0f
SHA2567792075522d755d85876dc2d88dc5dff16a925ac51733ea5d9894ec35192fec7
SHA5122b1b5e0ee4ceaa619a7e753f53919566293c85d09a59739bb88101fb82bfd55f7e781e8c35e0aed3fe54b87970b228a1021e33821ec5177ebfcebf156ce633d3
-
Filesize
1.3MB
MD57c9aeaf2c117345df0354d9cca3de5a5
SHA1ec0aa96e7da55d45aed7c7400c8724b0f93b1884
SHA2568f64fc5e5cd7d60336f4541103b0055f195cca33bf750f36a345d50a17b6cec9
SHA51287efca739d7dde209328f42467ed90a0cbb7824d194660542d6e7c6ad40387a8e9143f60e5638c2a5dd67c9f3bd8af80232abaab956fd5355fd8d1697fedadb5
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD535c0586cb9957861a5e7bd5352cc5fc3
SHA1e59749643a06d114b560108aeff9234cca65a876
SHA2564768cc112985d8a5ff228d246e42430c271d07ddf6d9c93d4ad009b1f7341475
SHA5123ef18ea15063830162d324fe91f5b20fddfd2bf845912b0c611986685daef413aaf8dd709f6108a5e16b9887a2fd93e8e3af94afdc52efa3104695d5cf11c806
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d