Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe
Resource
win7-20240903-en
General
-
Target
Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe
-
Size
3.2MB
-
MD5
a744298ce77f21893b7bea4ff8a55169
-
SHA1
1390307f9c1089aa7d2b1e3805d5f81c51e0641c
-
SHA256
99902a55361e77172f3fd6ab18e44d9ea4ed3889add5f7ed8e1910413cc20b5c
-
SHA512
e8b144cd7d040ed15c31a5c656440abdfe800a8187d7397626699788dda6ca696bd5df5b20d0e4c6f394e9701fc1a886e95bee143e0fb6e6c8591f129f654687
-
SSDEEP
49152:b1vqjdPQWclmJSVARa86xzW3xRoyqqxrTUHRa7OnJ7+6ECM6Ax:b1vqjRclWSV7SxyqxrUo7OdA6Ax
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4908-8-0x0000000010000000-0x0000000010199000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4908-8-0x0000000010000000-0x0000000010199000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4908 xqzhaji.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: xqzhaji.exe File opened (read-only) \??\Z: xqzhaji.exe File opened (read-only) \??\B: xqzhaji.exe File opened (read-only) \??\T: xqzhaji.exe File opened (read-only) \??\U: xqzhaji.exe File opened (read-only) \??\K: xqzhaji.exe File opened (read-only) \??\X: xqzhaji.exe File opened (read-only) \??\Y: xqzhaji.exe File opened (read-only) \??\H: xqzhaji.exe File opened (read-only) \??\I: xqzhaji.exe File opened (read-only) \??\J: xqzhaji.exe File opened (read-only) \??\P: xqzhaji.exe File opened (read-only) \??\S: xqzhaji.exe File opened (read-only) \??\W: xqzhaji.exe File opened (read-only) \??\G: xqzhaji.exe File opened (read-only) \??\N: xqzhaji.exe File opened (read-only) \??\O: xqzhaji.exe File opened (read-only) \??\Q: xqzhaji.exe File opened (read-only) \??\R: xqzhaji.exe File opened (read-only) \??\E: xqzhaji.exe File opened (read-only) \??\L: xqzhaji.exe File opened (read-only) \??\M: xqzhaji.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\q\xqzhaji.exe Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe File opened for modification C:\Windows\SysWOW64\q\xqzhaji.exe Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqzhaji.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xqzhaji.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz xqzhaji.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe 4940 Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe 4908 xqzhaji.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4908 xqzhaji.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4908 4940 Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe 82 PID 4940 wrote to memory of 4908 4940 Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe 82 PID 4940 wrote to memory of 4908 4940 Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe"C:\Users\Admin\AppData\Local\Temp\Thông báo về nội quy, quy định mới của công ty và thông báo điều chỉnh lương.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\q\xqzhaji.exe"C:\Windows\SysWOW64\q\xqzhaji.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5e3039de219761cd74aa36f12f434fcd6
SHA14df01d6c2d55876d2aa18fc104bc2186325e2c58
SHA25655cb035ca1cd54370ee634cf92fbf9b762baefff9e68de0936f744e3ffa494f9
SHA51244bfa7e8aa8d8eac5a865a38328fcd1941b88718c35acd94609eb5d9f6dec47873db1b3322c195b781d675f1831526dfdd71ac06bcee2bffaf98cc1ad808a3f1