Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 07:16
Static task
static1
Behavioral task
behavioral1
Sample
c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe
Resource
win10v2004-20240802-en
General
-
Target
c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe
-
Size
1.7MB
-
MD5
2b2203facd6aa2499abaed4097998415
-
SHA1
2aa21eb0a18a98eb5a48d0e489059c06cb0a8cf2
-
SHA256
c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e
-
SHA512
67a7051a7443e6fd3a7f17be74c0f33670e4a8ec2ced7a482f69d1c7413764da465f871f499ccf51d110a654a9cd659ce005e4544ed56d5eaad659248b478f52
-
SSDEEP
49152:4FAB9xU9ojaqspa0djfLDM2S3NTUG3LdgRePbQkGc:mAB9xU9ojl0dL82SdfcWb3Gc
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1320-16485-0x0000000000400000-0x0000000000688000-memory.dmp purplefox_rootkit behavioral1/memory/7828-16489-0x0000000000400000-0x0000000000688000-memory.dmp purplefox_rootkit behavioral1/memory/5000-25201-0x0000000000400000-0x0000000000688000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1320-16485-0x0000000000400000-0x0000000000688000-memory.dmp family_gh0strat behavioral1/memory/7828-16489-0x0000000000400000-0x0000000000688000-memory.dmp family_gh0strat behavioral1/memory/5000-25201-0x0000000000400000-0x0000000000688000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Aqiyq.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Aqiyq.exe -
Deletes itself 1 IoCs
pid Process 4628 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 7828 Aqiyq.exe 5000 Aqiyq.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Aqiyq.exe c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe File opened for modification C:\Windows\SysWOW64\Aqiyq.exe c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 41 IoCs
pid Process 1320 c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe 1320 c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe 1320 c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe 7828 Aqiyq.exe 7828 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe 5000 Aqiyq.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqiyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aqiyq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4628 cmd.exe 4664 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4664 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 5000 Aqiyq.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1320 c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe Token: SeLoadDriverPrivilege 5000 Aqiyq.exe Token: 33 5000 Aqiyq.exe Token: SeIncBasePriorityPrivilege 5000 Aqiyq.exe Token: 33 5000 Aqiyq.exe Token: SeIncBasePriorityPrivilege 5000 Aqiyq.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1320 wrote to memory of 4628 1320 c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe 32 PID 1320 wrote to memory of 4628 1320 c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe 32 PID 1320 wrote to memory of 4628 1320 c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe 32 PID 1320 wrote to memory of 4628 1320 c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe 32 PID 7828 wrote to memory of 5000 7828 Aqiyq.exe 33 PID 7828 wrote to memory of 5000 7828 Aqiyq.exe 33 PID 7828 wrote to memory of 5000 7828 Aqiyq.exe 33 PID 7828 wrote to memory of 5000 7828 Aqiyq.exe 33 PID 4628 wrote to memory of 4664 4628 cmd.exe 35 PID 4628 wrote to memory of 4664 4628 cmd.exe 35 PID 4628 wrote to memory of 4664 4628 cmd.exe 35 PID 4628 wrote to memory of 4664 4628 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe"C:\Users\Admin\AppData\Local\Temp\c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\C17CFA~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4664
-
-
-
C:\Windows\SysWOW64\Aqiyq.exeC:\Windows\SysWOW64\Aqiyq.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7828 -
C:\Windows\SysWOW64\Aqiyq.exeC:\Windows\SysWOW64\Aqiyq.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52b2203facd6aa2499abaed4097998415
SHA12aa21eb0a18a98eb5a48d0e489059c06cb0a8cf2
SHA256c17cfa8936d244bfe8e128c2c4adfc2c40e403e43f2aeeafbeb2fc9410b9ac4e
SHA51267a7051a7443e6fd3a7f17be74c0f33670e4a8ec2ced7a482f69d1c7413764da465f871f499ccf51d110a654a9cd659ce005e4544ed56d5eaad659248b478f52