Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 17:27 UTC

General

  • Target

    3ad5eda009261333870f4bf241ac556b8bcc7e7d2e0395b204256c8ea2402775N.dll

  • Size

    437KB

  • MD5

    f111d4370e3267a0a91dfeab083756f0

  • SHA1

    c4660bd2a09217e8db5bca929ecc0e840e3b9650

  • SHA256

    3ad5eda009261333870f4bf241ac556b8bcc7e7d2e0395b204256c8ea2402775

  • SHA512

    917e70333aff3e5b76c1582326618670bc6a6ea473bba690628cfcf12358dde7399b3706f1c8f7bf8a95dbe6315cd1f0bde1795059c98edbb49300b09bc5eadd

  • SSDEEP

    6144:bas0ZLc/IJvCklIqA8mvHwgnHJp9OWqw7zsK0bencTpX4KtjY5Jt/lt0zwzOu6Wl:gBFJqk2q1g5ppemr0bAKoNfnQCSWpoS/

Malware Config

Signatures

  • Detect PurpleFox Rootkit 2 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:604
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
        2⤵
          PID:2616
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
          2⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:616
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
          2⤵
            PID:4228
        • C:\Windows\system32\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\3ad5eda009261333870f4bf241ac556b8bcc7e7d2e0395b204256c8ea2402775N.dll,#1
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1000
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Users\Admin\AppData\Local\Temp\3ad5eda009261333870f4bf241ac556b8bcc7e7d2e0395b204256c8ea2402775N.dll,#1
            2⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2136

        Network

        • flag-us
          DNS
          8.8.8.8.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          8.8.8.8.in-addr.arpa
          IN PTR
          Response
          8.8.8.8.in-addr.arpa
          IN PTR
          dnsgoogle
        • flag-us
          DNS
          196.249.167.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          196.249.167.52.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          83.210.23.2.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          83.210.23.2.in-addr.arpa
          IN PTR
          Response
          83.210.23.2.in-addr.arpa
          IN PTR
          a2-23-210-83deploystaticakamaitechnologiescom
        • flag-us
          DNS
          www.qkjyaym.cn
          LocalServiceNetworkRestricted
          Remote address:
          8.8.8.8:53
          Request
          www.qkjyaym.cn
          IN A
          Response
        • flag-us
          DNS
          134.32.126.40.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          134.32.126.40.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          95.221.229.192.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          95.221.229.192.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          209.205.72.20.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          209.205.72.20.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          86.23.85.13.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          86.23.85.13.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          18.31.95.13.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          18.31.95.13.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          172.210.232.199.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          172.210.232.199.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          www.qkjyaym.cn
          LocalServiceNetworkRestricted
          Remote address:
          8.8.8.8:53
          Request
          www.qkjyaym.cn
          IN A
          Response
        • flag-us
          DNS
          67.209.201.84.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          67.209.201.84.in-addr.arpa
          IN PTR
          Response
        • flag-us
          DNS
          19.229.111.52.in-addr.arpa
          Remote address:
          8.8.8.8:53
          Request
          19.229.111.52.in-addr.arpa
          IN PTR
          Response
        • 10.127.0.233:8088
          LocalServiceNetworkRestricted
        • 8.8.8.8:53
          8.8.8.8.in-addr.arpa
          dns
          66 B
          90 B
          1
          1

          DNS Request

          8.8.8.8.in-addr.arpa

        • 8.8.8.8:53
          196.249.167.52.in-addr.arpa
          dns
          73 B
          147 B
          1
          1

          DNS Request

          196.249.167.52.in-addr.arpa

        • 8.8.8.8:53
          83.210.23.2.in-addr.arpa
          dns
          70 B
          133 B
          1
          1

          DNS Request

          83.210.23.2.in-addr.arpa

        • 8.8.8.8:53
          www.qkjyaym.cn
          dns
          LocalServiceNetworkRestricted
          60 B
          124 B
          1
          1

          DNS Request

          www.qkjyaym.cn

        • 8.8.8.8:53
          134.32.126.40.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          134.32.126.40.in-addr.arpa

        • 8.8.8.8:53
          95.221.229.192.in-addr.arpa
          dns
          73 B
          144 B
          1
          1

          DNS Request

          95.221.229.192.in-addr.arpa

        • 8.8.8.8:53
          209.205.72.20.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          209.205.72.20.in-addr.arpa

        • 8.8.8.8:53
          86.23.85.13.in-addr.arpa
          dns
          70 B
          144 B
          1
          1

          DNS Request

          86.23.85.13.in-addr.arpa

        • 8.8.8.8:53
          18.31.95.13.in-addr.arpa
          dns
          70 B
          144 B
          1
          1

          DNS Request

          18.31.95.13.in-addr.arpa

        • 8.8.8.8:53
          172.210.232.199.in-addr.arpa
          dns
          74 B
          128 B
          1
          1

          DNS Request

          172.210.232.199.in-addr.arpa

        • 8.8.8.8:53
          www.qkjyaym.cn
          dns
          LocalServiceNetworkRestricted
          60 B
          124 B
          1
          1

          DNS Request

          www.qkjyaym.cn

        • 8.8.8.8:53
          67.209.201.84.in-addr.arpa
          dns
          72 B
          132 B
          1
          1

          DNS Request

          67.209.201.84.in-addr.arpa

        • 8.8.8.8:53
          19.229.111.52.in-addr.arpa
          dns
          72 B
          158 B
          1
          1

          DNS Request

          19.229.111.52.in-addr.arpa

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/616-1-0x0000000000400000-0x0000000000543000-memory.dmp

          Filesize

          1.3MB

        • memory/616-9-0x0000000000400000-0x0000000000543000-memory.dmp

          Filesize

          1.3MB

        • memory/616-11-0x00000000765B3000-0x00000000765B4000-memory.dmp

          Filesize

          4KB

        • memory/616-8-0x0000000000400000-0x0000000000543000-memory.dmp

          Filesize

          1.3MB

        • memory/616-7-0x0000000000400000-0x0000000000543000-memory.dmp

          Filesize

          1.3MB

        • memory/616-3-0x0000000000400000-0x0000000000543000-memory.dmp

          Filesize

          1.3MB

        • memory/616-2-0x0000000000400000-0x0000000000543000-memory.dmp

          Filesize

          1.3MB

        • memory/616-12-0x0000000010000000-0x00000000101A0000-memory.dmp

          Filesize

          1.6MB

        • memory/616-13-0x0000000010000000-0x00000000101A0000-memory.dmp

          Filesize

          1.6MB

        • memory/2136-0-0x0000000010000000-0x00000000100A6000-memory.dmp

          Filesize

          664KB

        We care about your privacy.

        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.