Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe
Resource
win7-20240704-en
General
-
Target
7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe
-
Size
1.6MB
-
MD5
251a802e8bb13e39fe89ac035ed6fefd
-
SHA1
f429ee4243604981679ee4cba673773f2060ef23
-
SHA256
7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a
-
SHA512
fb520d84b406bdf877e68fd9de6da9484c0f58bf5344045113099ac19d444b45f0c898ff4a6f7b93ad2784aba2400023f9242c4ed5edcf03b56d4b03e07ff838
-
SSDEEP
49152:2QZAdVyVT9n/Gg0P+WhowluvT5dyWRudqIqfovfK9:3GdVyVT9nOgmhrluL5dyWRudqIqf79
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3360-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3360-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3360-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3660-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3660-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4172-33-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4172-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4172-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3660-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4172-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3660-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
resource yara_rule behavioral2/memory/3360-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3360-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3360-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3660-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3660-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x00070000000235f6-26.dat family_gh0strat behavioral2/memory/4172-33-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4172-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4172-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3660-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4172-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3660-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 4 IoCs
pid Process 3360 svchost.exe 3660 TXPlatforn.exe 396 svchos.exe 4172 TXPlatforn.exe -
Loads dropped DLL 1 IoCs
pid Process 396 svchos.exe -
resource yara_rule behavioral2/memory/3360-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3360-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3360-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3360-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3660-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3660-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4172-33-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4172-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4172-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3660-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4172-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3660-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3660-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240660171.txt svchos.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1372 396 WerFault.exe 93 1144 396 WerFault.exe 93 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1964 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4172 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3360 svchost.exe Token: SeLoadDriverPrivilege 4172 TXPlatforn.exe Token: 33 4172 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4172 TXPlatforn.exe Token: 33 4172 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4172 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 184 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe 184 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 184 wrote to memory of 3360 184 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe 89 PID 184 wrote to memory of 3360 184 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe 89 PID 184 wrote to memory of 3360 184 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe 89 PID 3360 wrote to memory of 3136 3360 svchost.exe 92 PID 3360 wrote to memory of 3136 3360 svchost.exe 92 PID 3360 wrote to memory of 3136 3360 svchost.exe 92 PID 184 wrote to memory of 396 184 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe 93 PID 184 wrote to memory of 396 184 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe 93 PID 184 wrote to memory of 396 184 7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe 93 PID 3660 wrote to memory of 4172 3660 TXPlatforn.exe 94 PID 3660 wrote to memory of 4172 3660 TXPlatforn.exe 94 PID 3660 wrote to memory of 4172 3660 TXPlatforn.exe 94 PID 3136 wrote to memory of 1964 3136 cmd.exe 99 PID 3136 wrote to memory of 1964 3136 cmd.exe 99 PID 3136 wrote to memory of 1964 3136 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe"C:\Users\Admin\AppData\Local\Temp\7c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:1964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 4443⤵
- Program crash
PID:1372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 4483⤵
- Program crash
PID:1144
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 396 -ip 3961⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 396 -ip 3961⤵PID:4388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1428,i,3027467512973953085,11878940668304988630,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:81⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5251a802e8bb13e39fe89ac035ed6fefd
SHA1f429ee4243604981679ee4cba673773f2060ef23
SHA2567c82c3d5b87d76d7efb561d75e845b866ba009f5e3f6d61b46c9d6fe0fe93e1a
SHA512fb520d84b406bdf877e68fd9de6da9484c0f58bf5344045113099ac19d444b45f0c898ff4a6f7b93ad2784aba2400023f9242c4ed5edcf03b56d4b03e07ff838
-
Filesize
1.4MB
MD55a998ebd0a8173cbe38781fdbcaa8ee6
SHA16f305475942e73f1b353b1c7d8d19106403c1459
SHA256f96e965fdae81e4950af31c62f5b8227d4c348cc7f5a3fc819be948befa53c8a
SHA5123728b5f49f905f5881ca6e5060d608af6a58c0edc8eb952af234db656ad21c25b4a2635ce1ffec528989d612b21816fa9cc77dc321d7de619e6c091cfff861a4
-
Filesize
69KB
MD5e33fb6d686b1a8b171349572c5a33f67
SHA129f24fe536adf799b69b63c83efadc1bce457a54
SHA256020c8e0963f89f4b14538b7d69e83c6fec44a29bbbd52fbb6deb2be5c697f450
SHA512cf1f1d6a9efe53f84e5b4a8246b87c0b96496716605d1b00352d9aae30e664d3d2cbadebf598b4e690a9feef0b5785887a4e643cc5f68938ca744af1d3539e55
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5c223a9ba736fe7ab2e296f62cb07084d
SHA1671d7936d2d5d71d1edcc80674e3925d5642b16d
SHA2564f3ebf8884b310bf7e178f6d0f97a984f2ca2f04b247fe049c5332232105bfdd
SHA5120f8ce1db0caefca72f7ceb5e524bde4939a26cc489252254326eda4ca3ea31e211afd432970ca28edd08e48a329fb0f93a1f55766aee10ae5ace1f17837abeb2