Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 04:28

General

  • Target

    WPS Office_104693057_401535.msi

  • Size

    15.4MB

  • MD5

    ca9086b9f4e1cbfae86204a0e2cbea07

  • SHA1

    4fb147699ab8b80fc6b89d9d1473bfb60dbd2a15

  • SHA256

    21a2e0d27dfe4f70d74e0be94a1700cbc0e58c87553f1140253109ab0d9701b2

  • SHA512

    b1f89f9342df8de10eaa1134eb9982942cee26abebf280b80a79b37f26e1f2b55de999d36249a731385c5a72bb2c3dd8b9b14f578263d3037799a1617279e984

  • SSDEEP

    393216:WAxJ3qt2MkEOEsQ+D8PjbtTBQqc4dq47aJ7IKw9M38hoTjZ5Uu0H:WU3o2NNjgrpFQq3dd7aJkvFhoTrV0H

Malware Config

Signatures

  • Detect PurpleFox Rootkit 3 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\WPS Office_104693057_401535.msi"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3368
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4596
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding E43761466F7AC8F733A4715D4BEA5E5A E Global\MSI0000
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Program Files\ImproveScoutGenerous\hdeQkiPuSHUY.exe
        "C:\Program Files\ImproveScoutGenerous\hdeQkiPuSHUY.exe" x "C:\Program Files\ImproveScoutGenerous\CLAnZJhYUhSfSJqyvyQH" -o"C:\Program Files\ImproveScoutGenerous\" -pNOcFSwDtYEhVUsSNDuRc -y
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2392
      • C:\Program Files\ImproveScoutGenerous\bDOnhmOcYL12.exe
        "C:\Program Files\ImproveScoutGenerous\bDOnhmOcYL12.exe" -number 237 -file file3 -mode mode3 -flag flag3
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        PID:1732
      • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Program Files\ImproveScoutGenerous\xlsx.xlsx"
        3⤵
        • Drops file in System32 directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:964
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:3716
  • C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.exe
    "C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.exe" install
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:3732
  • C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.exe
    "C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.exe" start
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:5024
  • C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.exe
    "C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.exe"
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Program Files\ImproveScoutGenerous\bDOnhmOcYL12.exe
      "C:\Program Files\ImproveScoutGenerous\bDOnhmOcYL12.exe" -number 208 -file file3 -mode mode3 -flag flag3
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Program Files\ImproveScoutGenerous\bDOnhmOcYL12.exe
        "C:\Program Files\ImproveScoutGenerous\bDOnhmOcYL12.exe" -number 362 -file file3 -mode mode3 -flag flag3
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\e57e928.rbs

    Filesize

    7KB

    MD5

    b8a7186f36dcfdeea2e10060f5697879

    SHA1

    67747d7ad48014113acb1c8504cf17d817a8d2ee

    SHA256

    36b845f35b4fb782728442c98e60c9fce50a55c7996692e11cd72848ae4b71fd

    SHA512

    20bc66019217a3f5d4457df5c0c00a211a5c9e6ad3f3329da4692d0e66e3da9d6b8ce5d1faed6fa81e84a3bac36955dd813e029a42e6c7d34a1d2b1edf3c5d78

  • C:\Program Files\ImproveScoutGenerous\CLAnZJhYUhSfSJqyvyQH

    Filesize

    1.7MB

    MD5

    b52875621f2ed8ba730e1baa322994ac

    SHA1

    2ddb59cc65ee3297eb0a959f868633c36d8bdab6

    SHA256

    ae9b0f8b4d037535b0682905c7082607b9bd730d2ac549c1f86f36ad459e06f8

    SHA512

    2958f18969b1ce08adce13d6b0b249eacb627099387a9fe60472f8a4ef78ee37f4c17c77a2fea62f2b59a80724cd46dd6a74fd1c994eabd8a8f6f36f873c524d

  • C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.exe

    Filesize

    832KB

    MD5

    d305d506c0095df8af223ac7d91ca327

    SHA1

    679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a

    SHA256

    923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66

    SHA512

    94d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796

  • C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.wrapper.log

    Filesize

    264B

    MD5

    954db6d0fbed8dcdface2ae09f9fb9ab

    SHA1

    48329e34d280df93167f950508b102f97fd80bcf

    SHA256

    2f440f79f2a6afe58887c43253a4415851fd5cc01292d3615273941c72c1a510

    SHA512

    6367793a415a066128004a6c7ae6feda00d7fe49997faa6f2cdfdbe7c8ef6f56efa521b55a7c7945f78ab06140602212099b1f5ab06b3081e41d8b7431c90d41

  • C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.wrapper.log

    Filesize

    419B

    MD5

    87860351b3a913f41c9324656aff530b

    SHA1

    1bde0ef893bfc96c24a77f8f5dad5eaf491d8e40

    SHA256

    ebabcbd6a404992fa4722f4f430b1179696a7f5e625a7065933efa8052d34f80

    SHA512

    e24b1e26e9c186db03612d3bac3ef5133ac2adcd63d2b947f34d8dd871da3c0b6212650db5ea60b3738aceee7bfa404bd4c56b828cd57730e1ef470efe9cd52c

  • C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.wrapper.log

    Filesize

    483B

    MD5

    0b06fde15bd33df16c7381d4b2993e0b

    SHA1

    4bd43a86be122fcaa0f6027848434d65ec4b4102

    SHA256

    d42fd29fb180d4699a5c8e2b08ef67d89ba6f0f5f10f8e2474390f140f134d99

    SHA512

    523505b480f5d3920295a1917d07110f3f855e55c340128b0e3255a77fd7e9afb458a9e3d3267033832a66b844ce4a807b319207a0eb75ccca0eac7ed1d05d03

  • C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.wrapper.log

    Filesize

    729B

    MD5

    be8a8ea3bfebdc7941d086ea03b1df34

    SHA1

    02dbe9aa3a9172a03311764e09cc4e3ca8b3efb4

    SHA256

    23bfcf79bc96442e10fb3f302a038b793bcb28828e00eab01848bca20ca13374

    SHA512

    ffd12f93f31a28518149d558f55ffb9a0ad2f89894ceafa3b32f465bd80245d80b6f6b9334638680f7681e0a1b5a82e0533ec9ffa50220d01ef76792eae6282a

  • C:\Program Files\ImproveScoutGenerous\HMeBxhzrchEW.xml

    Filesize

    436B

    MD5

    4cf97c82fea731dbe69cab5edd0aa0f6

    SHA1

    b0ffded6207300193a5f866329acb3caf68c56c5

    SHA256

    8040dc13f00cf121f852bf0ad8595e7030b64633e5b16b91a290a51d66876e17

    SHA512

    ac2a208697f8da081f924c695f68d35f10b5330c59c3939d375eb85eca071081e7c1916d023335ad6b09c58df8a7e85ba05f78d40fbf5ab1586782fb748349b8

  • C:\Program Files\ImproveScoutGenerous\bDOnhmOcYL12.exe

    Filesize

    2.8MB

    MD5

    8e355304eb0c0a6c787c158c6097d35d

    SHA1

    4978f2462040aee13f3d79e1f1dab5b4d4e8feb3

    SHA256

    ecf62496c9c74d3fddbd737964629a8cad0f42968c6f6c88652ca9f9b9bc9d3f

    SHA512

    9b3ab911e2e5002bea4877628dc4dd14e99ab8a5ece51fd76d5a65f0f39fbd7812390ebc328b857422d0bcde571385c9e6ab85d1a9214d7124e4f3d100490542

  • C:\Program Files\ImproveScoutGenerous\hdeQkiPuSHUY.exe

    Filesize

    574KB

    MD5

    42badc1d2f03a8b1e4875740d3d49336

    SHA1

    cee178da1fb05f99af7a3547093122893bd1eb46

    SHA256

    c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

    SHA512

    6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

  • C:\Program Files\ImproveScoutGenerous\xlsx.xlsx

    Filesize

    8KB

    MD5

    5001ead50aa6c32c9d7e6c6dfb4033f0

    SHA1

    c273c9bc2a996bb9ab65f7d30ccbf38bb755ed57

    SHA256

    a3d37b43693ef32bfcd324bb4f2523c828648e012828504302f3f182c97c4cda

    SHA512

    28d970204f02d6bc270fae20cf0ba78a8086e6dd2552f10f6c30d72c324fa2ca5ca44b2aca3830064caa57abd7255edb1147ea2bf0d103b22b75094f20f6d0bb

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HMeBxhzrchEW.exe.log

    Filesize

    1KB

    MD5

    122cf3c4f3452a55a92edee78316e071

    SHA1

    f2caa36d483076c92d17224cf92e260516b3cbbf

    SHA256

    42f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0

    SHA512

    c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c

  • C:\Windows\Installer\e57e927.msi

    Filesize

    15.4MB

    MD5

    ca9086b9f4e1cbfae86204a0e2cbea07

    SHA1

    4fb147699ab8b80fc6b89d9d1473bfb60dbd2a15

    SHA256

    21a2e0d27dfe4f70d74e0be94a1700cbc0e58c87553f1140253109ab0d9701b2

    SHA512

    b1f89f9342df8de10eaa1134eb9982942cee26abebf280b80a79b37f26e1f2b55de999d36249a731385c5a72bb2c3dd8b9b14f578263d3037799a1617279e984

  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

    Filesize

    23.7MB

    MD5

    b4654ae8fe3df329ea1e73a2d33fba4f

    SHA1

    b9a78c02783326f02c82c9814b60f297c7037e5f

    SHA256

    428f7b6fefc9631e88123fc3bd92ba72c7a4a4a8f59aaf861dad3789128ccf22

    SHA512

    e8fde80537a34544dc9ce61f1da794445db1788915b4ba0dcaf61175df3c3a6d0c3bba861f860577cd31e26aabcc0a9e6a7b15f2c248a67ed053069603e7cde7

  • \??\Volume{f3a72b53-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{f1e6b553-5cfc-455a-aa0e-017ce0fa6e06}_OnDiskSnapshotProp

    Filesize

    6KB

    MD5

    2f7fcb03dee61bacbe547b19d88669fc

    SHA1

    135bcd9b29f47ce3087679e20db5fef555d25e6d

    SHA256

    a7b79bf497839f3d2729b8323206e91dde2b3c52e0dca1ab88322e280dfa3334

    SHA512

    78029893d071aa3023dd5d5a4911a81ef2ad363000881fbcbb293c68e0deddbe58a65109311326e30700e0abcbf8d6e387e2ce992666e3a53f08460cd5e53e8f

  • memory/964-47-0x00007FF9D7AB0000-0x00007FF9D7AC0000-memory.dmp

    Filesize

    64KB

  • memory/964-44-0x00007FF9D7AB0000-0x00007FF9D7AC0000-memory.dmp

    Filesize

    64KB

  • memory/964-40-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/964-41-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/964-42-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/964-43-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/964-39-0x00007FF9D9B10000-0x00007FF9D9B20000-memory.dmp

    Filesize

    64KB

  • memory/1732-45-0x0000000029840000-0x000000002986A000-memory.dmp

    Filesize

    168KB

  • memory/2560-86-0x000000002A6C0000-0x000000002A703000-memory.dmp

    Filesize

    268KB

  • memory/2560-87-0x000000002C2F0000-0x000000002C4AB000-memory.dmp

    Filesize

    1.7MB

  • memory/2560-89-0x000000002C2F0000-0x000000002C4AB000-memory.dmp

    Filesize

    1.7MB

  • memory/2560-90-0x000000002C2F0000-0x000000002C4AB000-memory.dmp

    Filesize

    1.7MB

  • memory/3732-49-0x00000000001A0000-0x0000000000276000-memory.dmp

    Filesize

    856KB