Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 15:50

General

  • Target

    5f35f3392507407bf2c56783ae3a0230536b37779fae954beae8a220f77c8906.exe

  • Size

    1.7MB

  • MD5

    0d3fec8c0d605b2edb8e31ab316d6f86

  • SHA1

    e484fa7f5fda691ee3b621e42bfcc292decd885f

  • SHA256

    5f35f3392507407bf2c56783ae3a0230536b37779fae954beae8a220f77c8906

  • SHA512

    8af966f9a1d002c2338a52249d5c74f4a2b3c486a99ba099f17a25add3d6ea88f3507acbc4c55306699ca612af15754f6415310f32407bb8b51d9ccb5dc1c111

  • SSDEEP

    49152:CH3BEj/dUf/1DkjJ/MB7sE2VG9yF8ehCsrVp:+3B2/CwMBwEzlenz

Malware Config

Signatures

  • Detect PurpleFox Rootkit 1 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f35f3392507407bf2c56783ae3a0230536b37779fae954beae8a220f77c8906.exe
    "C:\Users\Admin\AppData\Local\Temp\5f35f3392507407bf2c56783ae3a0230536b37779fae954beae8a220f77c8906.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2432-0-0x0000000000400000-0x0000000000672000-memory.dmp

    Filesize

    2.4MB

  • memory/2432-1-0x00000000764C0000-0x0000000076507000-memory.dmp

    Filesize

    284KB

  • memory/2432-503-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-504-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-564-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-506-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-508-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-510-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-512-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-514-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-516-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-518-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-520-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-522-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-524-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-526-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-528-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-530-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-532-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-534-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-536-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-538-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-540-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-542-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-544-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-546-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-548-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-550-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-552-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-554-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-562-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-560-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-558-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-556-0x00000000024A0000-0x00000000025B1000-memory.dmp

    Filesize

    1.1MB

  • memory/2432-2239-0x00000000021F0000-0x0000000002371000-memory.dmp

    Filesize

    1.5MB

  • memory/2432-8005-0x0000000000400000-0x0000000000672000-memory.dmp

    Filesize

    2.4MB