Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe
Resource
win7-20240611-en
General
-
Target
bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe
-
Size
2.0MB
-
MD5
2460bfd8f757b0147113a73e867323ed
-
SHA1
3863136d042e2bf88754951e08e4830fdbc2f70c
-
SHA256
bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d
-
SHA512
5898ee9814c004d00768c02b8bf94103a054de601a22a174ffddbca2efc0b6beca343ce993357123e966784bf6ce3fa87f0622f711f3c3bc932942ec8568a12f
-
SSDEEP
49152:q09XJt4HIN2H2tFvduyS1WtriYW8MULKDW8:rZJt4HINy2Lk6iYW8MU2C8
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2984-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2984-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2984-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3260-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3260-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3260-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3260-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4556-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4556-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4556-34-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral2/memory/2984-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2984-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2984-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3260-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3260-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3260-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3260-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4556-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4556-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4556-34-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
pid Process 2984 RVN.exe 3260 TXPlatforn.exe 1908 HD_bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe 4556 TXPlatforn.exe -
resource yara_rule behavioral2/memory/2984-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2984-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2984-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2984-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3260-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3260-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3260-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3260-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3260-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4556-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4556-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4556-34-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4252 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3312 bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe 3312 bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4556 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2984 RVN.exe Token: SeRestorePrivilege 1908 HD_bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe Token: 35 1908 HD_bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe Token: SeLoadDriverPrivilege 4556 TXPlatforn.exe Token: 33 4556 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4556 TXPlatforn.exe Token: 33 4556 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4556 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3312 bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe 3312 bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3312 wrote to memory of 2984 3312 bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe 82 PID 3312 wrote to memory of 2984 3312 bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe 82 PID 3312 wrote to memory of 2984 3312 bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe 82 PID 2984 wrote to memory of 2904 2984 RVN.exe 85 PID 2984 wrote to memory of 2904 2984 RVN.exe 85 PID 2984 wrote to memory of 2904 2984 RVN.exe 85 PID 3312 wrote to memory of 1908 3312 bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe 86 PID 3312 wrote to memory of 1908 3312 bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe 86 PID 3260 wrote to memory of 4556 3260 TXPlatforn.exe 87 PID 3260 wrote to memory of 4556 3260 TXPlatforn.exe 87 PID 3260 wrote to memory of 4556 3260 TXPlatforn.exe 87 PID 2904 wrote to memory of 4252 2904 cmd.exe 89 PID 2904 wrote to memory of 4252 2904 cmd.exe 89 PID 2904 wrote to memory of 4252 2904 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe"C:\Users\Admin\AppData\Local\Temp\bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:4252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exeC:\Users\Admin\AppData\Local\Temp\HD_bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d7d176fb6473c7b9c9abb21722afebdb
SHA180b92220aa97bff7c6245cfbe098cc3f159f8bb2
SHA2565bcb77fa2c5abbf6753f046a5638251d4bb0c0f6e4ee92afb791d99f57aff39b
SHA51287fb0695cc86247ad9936fee875b60d76340bf7ac162b1ed9d4cd04e210cd2ffd559285695a8bfc23a147c632f1828e678fbb6b65003202f4657f1a9a6594944
-
C:\Users\Admin\AppData\Local\Temp\HD_bc8fa17932705dda2d094c42fff6f52c753666dde4b26f441c762201df91342d.exe
Filesize960KB
MD5b161d842906239bf2f32ad158bea57f1
SHA14a125d6cbeae9658e862c637aba8f8b9f3bf5cf7
SHA2563345c48505e0906f1352499ba7cbd439ac0c509a33f04c7d678e2c960c8b9f03
SHA5120d14c75c8e80af8246ddf122052190f5ffb1f81ffd5b752990747b7efcb566b49842219d9b26df9dbe267c9a3876d7b60158c9f08d295d0926b60dbbebc1fa3c
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4