Analysis
-
max time kernel
221s -
max time network
251s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 10:05
Static task
static1
General
-
Target
_007D000001~Rip(1).exe
-
Size
1.2MB
-
MD5
b08692bf5229ff68ef8eafd9a0b283da
-
SHA1
4a60b471acf4468eca27e8a5eb68fb6011181d1d
-
SHA256
3387cd28f17efd976288e7fdd00a13a11ad5083d8c9f5e36f4132bd50c8f5b60
-
SHA512
6a8a37480797fe451d41913e3867b492b6246a9ba71a8367f1bad1c22e2a5188e980fef478b78c912d0c3cecb8b2865dd8af10017d3222a52b0ca2f06e617f08
-
SSDEEP
24576:nezAqHGdeQI+sK0p876T+3BIW7GEyMZyL:ezATVI3u76T+RP7GEyMY
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1040-2-0x0000000010000000-0x00000000101A0000-memory.dmp purplefox_rootkit behavioral1/memory/1040-5-0x0000000010000000-0x00000000101A0000-memory.dmp purplefox_rootkit behavioral1/memory/2264-19-0x0000000010000000-0x00000000101A0000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/1040-2-0x0000000010000000-0x00000000101A0000-memory.dmp family_gh0strat behavioral1/memory/1040-5-0x0000000010000000-0x00000000101A0000-memory.dmp family_gh0strat behavioral1/memory/2264-19-0x0000000010000000-0x00000000101A0000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2264 svchost.exe 3284 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\NetMeeting\svchost.exe _007D000001~Rip(1).exe File opened for modification C:\Program Files (x86)\NetMeeting\svchost.exe _007D000001~Rip(1).exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _007D000001~Rip(1).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4544 cmd.exe 4668 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4668 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1040 _007D000001~Rip(1).exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1040 wrote to memory of 4544 1040 _007D000001~Rip(1).exe 88 PID 1040 wrote to memory of 4544 1040 _007D000001~Rip(1).exe 88 PID 1040 wrote to memory of 4544 1040 _007D000001~Rip(1).exe 88 PID 2264 wrote to memory of 3284 2264 svchost.exe 89 PID 2264 wrote to memory of 3284 2264 svchost.exe 89 PID 2264 wrote to memory of 3284 2264 svchost.exe 89 PID 4544 wrote to memory of 4668 4544 cmd.exe 91 PID 4544 wrote to memory of 4668 4544 cmd.exe 91 PID 4544 wrote to memory of 4668 4544 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\_007D000001~Rip(1).exe"C:\Users\Admin\AppData\Local\Temp\_007D000001~Rip(1).exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\_007D0~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4668
-
-
-
C:\Program Files (x86)\NetMeeting\svchost.exe"C:\Program Files (x86)\NetMeeting\svchost.exe" -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\NetMeeting\svchost.exe"C:\Program Files (x86)\NetMeeting\svchost.exe" -acsi2⤵
- Executes dropped EXE
PID:3284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5b08692bf5229ff68ef8eafd9a0b283da
SHA14a60b471acf4468eca27e8a5eb68fb6011181d1d
SHA2563387cd28f17efd976288e7fdd00a13a11ad5083d8c9f5e36f4132bd50c8f5b60
SHA5126a8a37480797fe451d41913e3867b492b6246a9ba71a8367f1bad1c22e2a5188e980fef478b78c912d0c3cecb8b2865dd8af10017d3222a52b0ca2f06e617f08