Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe
Resource
win7-20240508-en
General
-
Target
b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe
-
Size
1.5MB
-
MD5
4a439948f39720e5e6bd0840acdcc749
-
SHA1
f968d8f30d3a771d81fb0312752eb072a760d2fb
-
SHA256
b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10
-
SHA512
7c9220fee8c0a5f16cf2d94ee150f524401a622c25a14fc3f7c4fa1b5cd419560d8e97461903b0c54239ddfeb8200bd9bcb705016001b206bcbbb65b845811eb
-
SSDEEP
24576:jQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVQu/qhBT66cn:jQZAdVyVT9n/Gg0P+WhoHsABTun
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4000-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4000-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4000-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5096-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5096-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4600-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4600-34-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4600-39-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5096-26-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4600-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4000-23-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5096-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 13 IoCs
resource yara_rule behavioral2/memory/4000-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4000-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4000-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5096-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5096-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4600-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4600-34-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4600-39-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023564-43.dat family_gh0strat behavioral2/memory/5096-26-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4600-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4000-23-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5096-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240650687.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 5 IoCs
pid Process 4000 svchost.exe 5096 TXPlatforn.exe 4600 TXPlatforn.exe 2876 svchos.exe 1096 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
pid Process 2876 svchos.exe 1088 svchost.exe 1096 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
resource yara_rule behavioral2/memory/4000-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4000-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4000-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4000-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5096-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5096-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4600-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4600-34-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4600-39-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5096-26-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4600-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4000-23-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5096-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5096-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240650687.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1640 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4600 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4000 svchost.exe Token: SeLoadDriverPrivilege 4600 TXPlatforn.exe Token: 33 4600 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4600 TXPlatforn.exe Token: 33 4600 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4600 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 528 b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe 528 b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 528 wrote to memory of 4000 528 b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe 87 PID 528 wrote to memory of 4000 528 b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe 87 PID 528 wrote to memory of 4000 528 b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe 87 PID 4000 wrote to memory of 1956 4000 svchost.exe 92 PID 4000 wrote to memory of 1956 4000 svchost.exe 92 PID 4000 wrote to memory of 1956 4000 svchost.exe 92 PID 5096 wrote to memory of 4600 5096 TXPlatforn.exe 93 PID 5096 wrote to memory of 4600 5096 TXPlatforn.exe 93 PID 5096 wrote to memory of 4600 5096 TXPlatforn.exe 93 PID 528 wrote to memory of 2876 528 b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe 94 PID 528 wrote to memory of 2876 528 b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe 94 PID 528 wrote to memory of 2876 528 b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe 94 PID 1956 wrote to memory of 1640 1956 cmd.exe 98 PID 1956 wrote to memory of 1640 1956 cmd.exe 98 PID 1956 wrote to memory of 1640 1956 cmd.exe 98 PID 1088 wrote to memory of 1096 1088 svchost.exe 101 PID 1088 wrote to memory of 1096 1088 svchost.exe 101 PID 1088 wrote to memory of 1096 1088 svchost.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe"C:\Users\Admin\AppData\Local\Temp\b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:1640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2876
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:4444
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240650687.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3856,i,7545522914305657361,9950105517201397946,262144 --variations-seed-version --mojo-platform-channel-handle=4292 /prefetch:81⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD54a439948f39720e5e6bd0840acdcc749
SHA1f968d8f30d3a771d81fb0312752eb072a760d2fb
SHA256b6432a97b5a1cc7a69c464eb2fb97e41f6014d66e1358d9af87271be9e05fa10
SHA5127c9220fee8c0a5f16cf2d94ee150f524401a622c25a14fc3f7c4fa1b5cd419560d8e97461903b0c54239ddfeb8200bd9bcb705016001b206bcbbb65b845811eb
-
Filesize
1.6MB
MD5d1047b0ccdfbeac8727aba803c947d44
SHA1d180b1b1090672b69c070cc96c9190d92c61cf45
SHA25608c052761462c8be97b71d89aba922233c19adf1ffe93c594b05f8c7f0455463
SHA5128fb2910cf328d7e973c0a14b6e76a6dc6e015b0eb24c251e66be938cd5e53bde20196f518ddb4d4030b867bebe8914c05ba54f86afd6177cff0eaf01d5dab92f
-
Filesize
69KB
MD5e33fb6d686b1a8b171349572c5a33f67
SHA129f24fe536adf799b69b63c83efadc1bce457a54
SHA256020c8e0963f89f4b14538b7d69e83c6fec44a29bbbd52fbb6deb2be5c697f450
SHA512cf1f1d6a9efe53f84e5b4a8246b87c0b96496716605d1b00352d9aae30e664d3d2cbadebf598b4e690a9feef0b5785887a4e643cc5f68938ca744af1d3539e55
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5a6ec4cbead95b83119135e3a734460ac
SHA103299d554f218a7151d8ec8931d5faaa5821007a
SHA256eaac73d1f5656df528caaf491ab4edf1725eb6037bbdbcce6d55055bcf1abb75
SHA5126bb5eab5533d56db7de88ff59b6310b809091607ada268de206769943f823a7b1e14f58766c5e8a90da81f0f482fec9f6559e639bb55388e532fb3f5a8db60ae
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641