Malware Analysis Report

2025-01-02 15:08

Sample ID 240625-vszccavgnp
Target c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f
SHA256 c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f
Tags
gh0strat purplefox persistence rat rootkit trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f

Threat Level: Known bad

The file c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f was found to be: Known bad.

Malicious Activity Summary

gh0strat purplefox persistence rat rootkit trojan upx

Gh0st RAT payload

Detect PurpleFox Rootkit

PurpleFox

Gh0strat

Drops file in Drivers directory

Server Software Component: Terminal Services DLL

Sets service image path in registry

Loads dropped DLL

Executes dropped EXE

UPX packed file

Checks system information in the registry

Drops file in System32 directory

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Runs ping.exe

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Suspicious behavior: LoadsDriver

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-25 17:15

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-25 17:15

Reported

2024-06-25 17:18

Platform

win7-20240611-en

Max time kernel

150s

Max time network

122s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe"

Signatures

Detect PurpleFox Rootkit

rootkit
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Gh0st RAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Gh0strat

rat gh0strat

PurpleFox

rootkit trojan purplefox

Drops file in Drivers directory

Description Indicator Process Target
File created C:\Windows\system32\drivers\QAssist.sys C:\Windows\SysWOW64\TXPlatforn.exe N/A

Server Software Component: Terminal Services DLL

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\259398524.txt" C:\Users\Admin\AppData\Local\Temp\svchos.exe N/A

Sets service image path in registry

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" C:\Windows\SysWOW64\TXPlatforn.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks system information in the registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe C:\Windows\SysWOW64\svchost.exe N/A
File created C:\Windows\SysWOW64\TXPlatforn.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
File created C:\Windows\SysWOW64\259398524.txt C:\Users\Admin\AppData\Local\Temp\svchos.exe N/A
File opened for modification C:\Windows\SysWOW64\ini.ini C:\Users\Admin\AppData\Local\Temp\svchos.exe N/A
File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe C:\Windows\SysWOW64\svchost.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A
File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2468 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2468 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2468 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2468 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2468 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2468 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2468 wrote to memory of 1864 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 1864 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 1864 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 1864 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 1864 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 2468 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchos.exe
PID 2468 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchos.exe
PID 2468 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchos.exe
PID 2468 wrote to memory of 1688 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchos.exe
PID 2188 wrote to memory of 832 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 2188 wrote to memory of 832 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 2188 wrote to memory of 832 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 2188 wrote to memory of 832 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 2188 wrote to memory of 832 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 2188 wrote to memory of 832 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 2188 wrote to memory of 832 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 2216 wrote to memory of 2708 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2216 wrote to memory of 2708 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2216 wrote to memory of 2708 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2216 wrote to memory of 2708 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 2468 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe
PID 2468 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe
PID 2468 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe
PID 2468 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe
PID 2544 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
PID 2544 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
PID 2544 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
PID 2544 wrote to memory of 2644 N/A C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
PID 2816 wrote to memory of 2012 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
PID 2816 wrote to memory of 2012 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
PID 2816 wrote to memory of 2012 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
PID 2816 wrote to memory of 2012 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe

"C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe"

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Users\Admin\AppData\Local\Temp\\svchost.exe

C:\Windows\SysWOW64\TXPlatforn.exe

C:\Windows\SysWOW64\TXPlatforn.exe -auto

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul

C:\Users\Admin\AppData\Local\Temp\svchos.exe

C:\Users\Admin\AppData\Local\Temp\\svchos.exe

C:\Windows\SysWOW64\TXPlatforn.exe

C:\Windows\SysWOW64\TXPlatforn.exe -acsi

C:\Windows\SysWOW64\PING.EXE

ping -n 2 127.0.0.1

C:\Windows\SysWOW64\svchost.exe

C:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"

C:\Windows\SysWOW64\svchost.exe

C:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"

C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe

C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe

C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\

C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe

C:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\259398524.txt",MainThread

Network

Country Destination Domain Proto
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 mcs.zijieapi.com udp
GB 79.133.176.213:443 mcs.zijieapi.com tcp

Files

\Users\Admin\AppData\Local\Temp\svchost.exe

MD5 a4329177954d4104005bce3020e5ef59
SHA1 23c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA256 6156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA512 81e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208

memory/1864-5-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/1864-7-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/1864-8-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/1864-9-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/2188-18-0x0000000010000000-0x00000000101B6000-memory.dmp

\Users\Admin\AppData\Local\Temp\svchos.exe

MD5 3b377ad877a942ec9f60ea285f7119a2
SHA1 60b23987b20d913982f723ab375eef50fafa6c70
SHA256 62954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512 af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f

\Windows\SysWOW64\259398524.txt

MD5 c64d11e5b52c61ca3a816510e13eab0d
SHA1 2a8fc83bedcadb9c77613e521ce9a7134d48de2d
SHA256 40b31ebd88c08aee0e9c8068c248165fdaed929117208a3152ef8aca811ac5b0
SHA512 31529f7b9175f581438cee7126e25983c4db568958da9ffb856714c5856ba17243f46505ec9efb83a8bab125cea578abe985583b538d717dbca074d66e00400c

memory/2188-32-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/832-35-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/832-39-0x0000000010000000-0x00000000101B6000-memory.dmp

\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe

MD5 0a9a34d1ecc3971309d308d23bc5a521
SHA1 c67ce7198060c7932b21ab6f44365937b8c238e1
SHA256 0629d624639ada69818546593f3b172155f7a2e2ecb3a46f7503b52fcbdb29c5
SHA512 a946054bb26f981cc9a550dde8200f8ac8b71939b7d35f452af55bf9638343f05f3268ecb582c023e8ea27fc26cd481fca0f2488f44826c7c62945db02395c6d

memory/832-49-0x0000000010000000-0x00000000101B6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\HD_X.dat

MD5 13b21c13a718f11d9bb3f9028e5b29c3
SHA1 581dab1bd698bce174d90aaa0bccb7e8ecfaee36
SHA256 0cd9997c8ff6d348235ba2dca048238a22b17890b5b79eddd0e2db0cc4cd9e23
SHA512 d7494d5f215b2f3e92f00a5be442889aa4f3fc2c73bc32391df51544f51e8600e48dab7f4207978adcd6c4daaa752216116bfa93c73ceb230a455cab73787e80

\Users\Admin\AppData\Local\Temp\nso1E0D.tmp\System.dll

MD5 e0250bb909fa99dee20674f2f5795017
SHA1 ce62d51039575ac39e7e57c0a721dc782737beb4
SHA256 98fc3368ede123d2626bb7aa561da05971eee0cbae59b3d68d8cee92214cf454
SHA512 a4a2cbc38511d4a6f9b5d2359f7a52761252e538a4b9897667a44c92adba6cebc3c062d803741228529ca668e3d98bc479bd9ce53c8cae7ff849dabf49117158

\Users\Admin\AppData\Local\Temp\nso1E0D.tmp\nsis_plugin.dll

MD5 76f2c8a7c5f0f17a834d3501d36185ef
SHA1 126da1656295fd2ae9c8938d33e5cf89ea540067
SHA256 b3acedc0a099322ff50dba7f9dfc3d89bf1bca6824791a43c3b9c8bab544c44e
SHA512 2c76a95eedbca0a17e2f54e6387f66361e86c0e634886f51e383616a3a735d9c1d1aecf7925b1ebe226c2a5e5fbee50ece70a9723e294539c8dc0347b42e362c

C:\Users\Admin\AppData\Local\Temp\Cab20BE.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar20E0.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe

MD5 51138beea3e2c21ec44d0932c71762a8
SHA1 8939cf35447b22dd2c6e6f443446acc1bf986d58
SHA256 5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512 794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-25 17:15

Reported

2024-06-25 17:18

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe"

Signatures

Detect PurpleFox Rootkit

rootkit
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Gh0st RAT payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Gh0strat

rat gh0strat

PurpleFox

rootkit trojan purplefox

Drops file in Drivers directory

Description Indicator Process Target
File created C:\Windows\system32\drivers\QAssist.sys C:\Windows\SysWOW64\TXPlatforn.exe N/A

Server Software Component: Terminal Services DLL

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240601265.txt" C:\Users\Admin\AppData\Local\Temp\svchos.exe N/A

Sets service image path in registry

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" C:\Windows\SysWOW64\TXPlatforn.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks system information in the registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe C:\Windows\SysWOW64\svchost.exe N/A
File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe C:\Windows\SysWOW64\svchost.exe N/A
File created C:\Windows\SysWOW64\TXPlatforn.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
File created C:\Windows\SysWOW64\240601265.txt C:\Users\Admin\AppData\Local\Temp\svchos.exe N/A
File opened for modification C:\Windows\SysWOW64\ini.ini C:\Users\Admin\AppData\Local\Temp\svchos.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A
File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe N/A

Enumerates physical storage devices

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\PING.EXE N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeIncBasePriorityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\TXPlatforn.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3380 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 3380 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 3380 wrote to memory of 2412 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchost.exe
PID 2412 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 2412 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 2412 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 208 wrote to memory of 2348 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 208 wrote to memory of 2348 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 208 wrote to memory of 2348 N/A C:\Windows\SysWOW64\TXPlatforn.exe C:\Windows\SysWOW64\TXPlatforn.exe
PID 3380 wrote to memory of 3748 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchos.exe
PID 3380 wrote to memory of 3748 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchos.exe
PID 3380 wrote to memory of 3748 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\svchos.exe
PID 3380 wrote to memory of 60 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe
PID 3380 wrote to memory of 60 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe
PID 3380 wrote to memory of 60 N/A C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe
PID 60 wrote to memory of 1524 N/A C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
PID 60 wrote to memory of 1524 N/A C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
PID 60 wrote to memory of 1524 N/A C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
PID 5108 wrote to memory of 3964 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 5108 wrote to memory of 3964 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 5108 wrote to memory of 3964 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\PING.EXE
PID 640 wrote to memory of 4772 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
PID 640 wrote to memory of 4772 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe
PID 640 wrote to memory of 4772 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe

"C:\Users\Admin\AppData\Local\Temp\c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe"

C:\Users\Admin\AppData\Local\Temp\svchost.exe

C:\Users\Admin\AppData\Local\Temp\\svchost.exe

C:\Windows\SysWOW64\TXPlatforn.exe

C:\Windows\SysWOW64\TXPlatforn.exe -auto

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul

C:\Windows\SysWOW64\TXPlatforn.exe

C:\Windows\SysWOW64\TXPlatforn.exe -acsi

C:\Users\Admin\AppData\Local\Temp\svchos.exe

C:\Users\Admin\AppData\Local\Temp\\svchos.exe

C:\Windows\SysWOW64\svchost.exe

C:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"

C:\Windows\SysWOW64\svchost.exe

C:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"

C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe

C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe

C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\

C:\Windows\SysWOW64\PING.EXE

ping -n 2 127.0.0.1

C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe

C:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240601265.txt",MainThread

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 mcs.zijieapi.com udp
GB 79.133.176.166:443 mcs.zijieapi.com tcp
US 8.8.8.8:53 82.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 166.176.133.79.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 3.166.122.92.in-addr.arpa udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 80.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 52.111.229.48:443 tcp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 hackerinvasion.f3322.net udp
US 8.8.8.8:53 13.179.89.13.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\svchost.exe

MD5 a4329177954d4104005bce3020e5ef59
SHA1 23c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA256 6156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA512 81e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208

memory/2412-6-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/2412-7-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/2412-5-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/2412-10-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/208-13-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/208-17-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/208-15-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/2348-22-0x0000000010000000-0x00000000101B6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\HD_c87d90a0b1dc224a814c877f5a525c76585096c7a0ad00a57fc141ea088ffe7f.exe

MD5 0a9a34d1ecc3971309d308d23bc5a521
SHA1 c67ce7198060c7932b21ab6f44365937b8c238e1
SHA256 0629d624639ada69818546593f3b172155f7a2e2ecb3a46f7503b52fcbdb29c5
SHA512 a946054bb26f981cc9a550dde8200f8ac8b71939b7d35f452af55bf9638343f05f3268ecb582c023e8ea27fc26cd481fca0f2488f44826c7c62945db02395c6d

memory/208-46-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/2348-47-0x0000000010000000-0x00000000101B6000-memory.dmp

memory/2348-61-0x0000000010000000-0x00000000101B6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\HD_X.dat

MD5 13b21c13a718f11d9bb3f9028e5b29c3
SHA1 581dab1bd698bce174d90aaa0bccb7e8ecfaee36
SHA256 0cd9997c8ff6d348235ba2dca048238a22b17890b5b79eddd0e2db0cc4cd9e23
SHA512 d7494d5f215b2f3e92f00a5be442889aa4f3fc2c73bc32391df51544f51e8600e48dab7f4207978adcd6c4daaa752216116bfa93c73ceb230a455cab73787e80

C:\Users\Admin\AppData\Local\Temp\nsw4A39.tmp\System.dll

MD5 e0250bb909fa99dee20674f2f5795017
SHA1 ce62d51039575ac39e7e57c0a721dc782737beb4
SHA256 98fc3368ede123d2626bb7aa561da05971eee0cbae59b3d68d8cee92214cf454
SHA512 a4a2cbc38511d4a6f9b5d2359f7a52761252e538a4b9897667a44c92adba6cebc3c062d803741228529ca668e3d98bc479bd9ce53c8cae7ff849dabf49117158

C:\Users\Admin\AppData\Local\Temp\nsw4A39.tmp\nsis_plugin.dll

MD5 76f2c8a7c5f0f17a834d3501d36185ef
SHA1 126da1656295fd2ae9c8938d33e5cf89ea540067
SHA256 b3acedc0a099322ff50dba7f9dfc3d89bf1bca6824791a43c3b9c8bab544c44e
SHA512 2c76a95eedbca0a17e2f54e6387f66361e86c0e634886f51e383616a3a735d9c1d1aecf7925b1ebe226c2a5e5fbee50ece70a9723e294539c8dc0347b42e362c

memory/2348-102-0x0000000010000000-0x00000000101B6000-memory.dmp

C:\Windows\SysWOW64\240601265.txt

MD5 c64d11e5b52c61ca3a816510e13eab0d
SHA1 2a8fc83bedcadb9c77613e521ce9a7134d48de2d
SHA256 40b31ebd88c08aee0e9c8068c248165fdaed929117208a3152ef8aca811ac5b0
SHA512 31529f7b9175f581438cee7126e25983c4db568958da9ffb856714c5856ba17243f46505ec9efb83a8bab125cea578abe985583b538d717dbca074d66e00400c

C:\Users\Admin\AppData\Local\Temp\svchos.exe

MD5 3b377ad877a942ec9f60ea285f7119a2
SHA1 60b23987b20d913982f723ab375eef50fafa6c70
SHA256 62954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512 af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f

C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe

MD5 889b99c52a60dd49227c5e485a016679
SHA1 8fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA256 6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA512 08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641