Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 20:08

General

  • Target

    TwDush.msi

  • Size

    66.4MB

  • MD5

    9800a890a4819b574c5aa5ca9e063d96

  • SHA1

    ede8c738d4e58c770f0ba7792e330756aaf28c7f

  • SHA256

    ec40da7be23e50181fb692525cc62f6cd5f5caa74f653fabaf5d57df1201263b

  • SHA512

    ae52316d3f17cab0370ce6a772861ae5ca5a556f140955c93edf91852695964b57b108c1b85a342d2c52ae8090a6c3d97e7fe5a1c4bd87435135572ab5ca12cf

  • SSDEEP

    1572864:vXU1B6zASrGGq3ymZM4yLpQBoxFlfAwwsUZWOVH:vXU1B6ASrGGqCcM/DxFBDwhZzH

Malware Config

Signatures

  • Detect PurpleFox Rootkit 3 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 8 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\TwDush.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3392
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3272
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 44F08913C9A257A8C177324187AE24F1 E Global\MSI0000
        2⤵
        • System Location Discovery: System Language Discovery
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:5072
        • C:\Program Files\PlanAnalyzerOptimistic\mvlKSjKRHbPQ.exe
          "C:\Program Files\PlanAnalyzerOptimistic\mvlKSjKRHbPQ.exe" x "C:\Program Files\PlanAnalyzerOptimistic\VKWrWBaIcvTlXvwirqQe" -o"C:\Program Files\PlanAnalyzerOptimistic\" -pyjlAFQsGZRtyUdVIXREr -y
          3⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1332
        • C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe
          "C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe" -number 132 -file file3 -mode mode3 -flag flag3
          3⤵
          • Drops file in Program Files directory
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:1232
        • C:\Program Files\PlanAnalyzerOptimistic\ToDesk.exe
          "C:\Program Files\PlanAnalyzerOptimistic\ToDesk.exe"
          3⤵
          • Executes dropped EXE
          PID:4048
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:2416
    • C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.exe
      "C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.exe" install
      1⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      PID:4716
    • C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.exe
      "C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.exe" start
      1⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      PID:3176
    • C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.exe
      "C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.exe"
      1⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3528
      • C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe
        "C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe" -number 157 -file file3 -mode mode3 -flag flag3
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe
          "C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe" -number 362 -file file3 -mode mode3 -flag flag3
          3⤵
          • Enumerates connected drives
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          PID:3588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e584a82.rbs

      Filesize

      7KB

      MD5

      afa6523989a8a801ca6fd5302ffa0407

      SHA1

      09ba46ce83802d308fc2d2109298fc6346df5dde

      SHA256

      b17fb45e38ff8e4489c1b89909f0fd9002b901578e4be459c20321b96e261034

      SHA512

      795905ea74a2641dde2711b2c57085d122621019d8df605138e5ee871b0693e613353856d273fa7318b91351dc8051f29d93257ec1533100323a5c96c42b61de

    • C:\Program Files\PlanAnalyzerOptimistic\MOELauncherSetup_V0TKW.exe

      Filesize

      35.6MB

      MD5

      f0b4afeb9a9582a84c04d33b4f9c93e5

      SHA1

      0b9229e8e3879fc4d1310ba493280894cac1f259

      SHA256

      d71c5c27f6e68be09e40921321a2c6d3b95f65787c33dcc2d66e6939a798a3c9

      SHA512

      d4c3593590a5574bbfc1270d3aca3b419ea5126735206b5e2104e42fda961844ba90073ebacd917b9b0152c103670d1a64b88c76b03b358feae73794418abe51

    • C:\Program Files\PlanAnalyzerOptimistic\PtsxcsyatT16.exe

      Filesize

      2.9MB

      MD5

      772375794abfe39763f2057e845ff14b

      SHA1

      08ada20435475025e8b22d4a7460725fdcb0c3d5

      SHA256

      c31afb76379f0adaaa98d52f7a6dca18cd9f374672e1e85c6c4f7214080e2248

      SHA512

      ab67f8af704b0bf8902120b23fd2d31a1b12f05dc64f17b0f5fafb1c96bbf93481d4e147967a891028c2f4f0c5dc0b1eb135c003a2bc33ca4e118c60b70a2ad2

    • C:\Program Files\PlanAnalyzerOptimistic\ToDesk.exe

      Filesize

      48.3MB

      MD5

      1193d280fe00a77b753b8c196969fddf

      SHA1

      2ba757374129b149823d67a99e907989732c31dc

      SHA256

      56e4cbc58c71fbab44bef5bb191659e92fa6713b6e1834465464f4dea44498ad

      SHA512

      dd62534de37eae14cce7e83ccdf2e9f1fd6d87ea104c25bb107af4826a128ee40507958ce37c3df937ea238f1370a5e3f3cdcf701d015f6e2d31e45d4c0d1327

    • C:\Program Files\PlanAnalyzerOptimistic\VKWrWBaIcvTlXvwirqQe

      Filesize

      1.7MB

      MD5

      2b86a11112da3cafddcd7ee308cea7c9

      SHA1

      994cce38475425226d857550c86f1651fcfdc2dc

      SHA256

      5f80ac378a228c920d0dd85c05c986c06ef3bc05b0b98a85df03428a00c6f9e3

      SHA512

      da141c69561b862dec313b23a636a34ce831c18973c71c1450372350b1aba9be8291b3ecaa909166bb25f4bfbbd0477c6ff2711bb7475ca8c333a9c677ad56a2

    • C:\Program Files\PlanAnalyzerOptimistic\mvlKSjKRHbPQ.exe

      Filesize

      574KB

      MD5

      42badc1d2f03a8b1e4875740d3d49336

      SHA1

      cee178da1fb05f99af7a3547093122893bd1eb46

      SHA256

      c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf

      SHA512

      6bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c

    • C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.exe

      Filesize

      832KB

      MD5

      d305d506c0095df8af223ac7d91ca327

      SHA1

      679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a

      SHA256

      923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66

      SHA512

      94d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796

    • C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.wrapper.log

      Filesize

      280B

      MD5

      36d597f947c6de92911a8d3cc82c3c5d

      SHA1

      cca97d487243183e2b549edd8f6df4328b5b10c7

      SHA256

      3b523b8aecf0149a21aaadb48e4196e324ac97bdc9b9446521ccdd6127cd77d5

      SHA512

      5b0190a2436e81bd34b2613fda6c7af4602b175e88d822488e0ee96757cd66ede8664c41ca2446fc764f23e8e662ffd3c0143f2c3d439a15fb2f2c73178cbc0f

    • C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.wrapper.log

      Filesize

      443B

      MD5

      f679215aa278b3424c9ec229c7e9509b

      SHA1

      bcf9afccdeb2369b0ad02120cf3ff2495b657754

      SHA256

      8395003de1bf6a4e16f7561e5ed07ee4ec5be4330731f8d8831a61b897802ff1

      SHA512

      520b7b306bde50e8498b35bf9bd3f9718d19d18b12b8fc25eeea9d69fdde8b09d6b46ae76e1c4c1dc929009df9ada529c529c4d93b7ac2c29bab3e1cea541665

    • C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.wrapper.log

      Filesize

      507B

      MD5

      a91e13abf1dde3b0726be18ee0c75297

      SHA1

      bb9642a7163c99eb20fbba36722770dbcec7a4c2

      SHA256

      cca019b87d556c01ffd9b0c15afba02e49e721cf0815a4d8f2da35e327376e99

      SHA512

      8cc5252406142fb1282a1b07e26bc6022c479e1b15a58f82387c42e2bb9ee43a4fcf2322abb9a33f0674f95eeb2c88eaaaee8bd6b0b15737fbf996a486a82ab2

    • C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.wrapper.log

      Filesize

      803B

      MD5

      20563c561baff5e4caa9a64fa8306658

      SHA1

      03380cd23e915630a72e1d4d76f49c870aa39709

      SHA256

      bce83661d974b309920af0e6aa24fb3fbe8fd0bcd8cb0975662c87ea5471e77e

      SHA512

      5b547edfc7e99611599ce9128d00468525b25816ecfdc8ccf14ce69758e26c3608f3359f42389d4e7ee708ff996469ab6dfabab7e4807f17c9fab8b1f082fb01

    • C:\Program Files\PlanAnalyzerOptimistic\tADwcTndbYNd.xml

      Filesize

      454B

      MD5

      0bb0372549d39db06d87992e2692c3ab

      SHA1

      029139cb33bb4a91ce63860885e31e0539439418

      SHA256

      1ebfb436d54c049d89e23306341097350e477de8b955146c3d69448ef4992b67

      SHA512

      26d544bfe0b96b124ca36679f2c879b2db682a97c0ac4828cb101b9f292c90b34ef013a16e42f51319d2d15e3f81e408c6d4edfc9b24272397d2344b67a0b82b

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\tADwcTndbYNd.exe.log

      Filesize

      1KB

      MD5

      122cf3c4f3452a55a92edee78316e071

      SHA1

      f2caa36d483076c92d17224cf92e260516b3cbbf

      SHA256

      42f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0

      SHA512

      c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.7MB

      MD5

      2a55f963c634d1bfc997b18af5abde10

      SHA1

      b2004137f43401f607d3fc3b55eaa085aa78ea0b

      SHA256

      14934dd66a0f882a22075c7fa9bdfecf6187a1dff65ab95319716388260772d3

      SHA512

      bb3db9dd2d6ba983f44f0288ac403af9eb2586aa438438ab0032a8d5b17aaf02f942c623cf92b3a58afcb36d83499f40fd6720d150d464a9e755592fac7ec867

    • \??\Volume{f171a6e7-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{f1115372-6059-4a69-b0d3-92926b2ecf60}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      962a51f6b15117fbdc555505c530bc65

      SHA1

      e63c810241552010bc4c8fa7efaa1ac59e38d858

      SHA256

      e057842bf36817cf3cc5b1a900b5ed3a220cd9eada5b8f8ac51d1d90c4838601

      SHA512

      3bb9527be565ff2332c5c1f952d20049c1c56c7ce5be7fa7f7585abee4df30d7239f125acc1034fbb15d5d4ff42165754774e30a61b8350dc8a00d889b48a6a7

    • memory/1232-25-0x0000000009FD0000-0x0000000009FFA000-memory.dmp

      Filesize

      168KB

    • memory/3588-71-0x000000002A440000-0x000000002A483000-memory.dmp

      Filesize

      268KB

    • memory/3588-72-0x000000002C070000-0x000000002C22B000-memory.dmp

      Filesize

      1.7MB

    • memory/3588-74-0x000000002C070000-0x000000002C22B000-memory.dmp

      Filesize

      1.7MB

    • memory/3588-75-0x000000002C070000-0x000000002C22B000-memory.dmp

      Filesize

      1.7MB

    • memory/4716-42-0x0000000000B20000-0x0000000000BF6000-memory.dmp

      Filesize

      856KB