Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe
Resource
win7-20240903-en
General
-
Target
b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe
-
Size
2.7MB
-
MD5
7fe999951177018ba949286e2f461710
-
SHA1
bb9e9ff1cc65661c7d4f0dfa4475a3db57665c74
-
SHA256
b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3
-
SHA512
235e3e857c2c6cc6ec4be25595e0d022948beb9124a99e4c2488a43c27f8fd78289fcaafa686f249555f563ed1a0c480582a0ecbcdd49fd7aac04f1db37db1bb
-
SSDEEP
49152:S1vqjdPQ/2rTIegav9spLz5hsEP/lSEOqyRsKrldFJgOiDun31YS9KN:S1vqj4MVgKsxzkZsKhdspi3v9m
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5020-8-0x0000000010000000-0x0000000010199000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/5020-8-0x0000000010000000-0x0000000010199000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 5020 xqxin.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: xqxin.exe File opened (read-only) \??\U: xqxin.exe File opened (read-only) \??\I: xqxin.exe File opened (read-only) \??\K: xqxin.exe File opened (read-only) \??\E: xqxin.exe File opened (read-only) \??\J: xqxin.exe File opened (read-only) \??\L: xqxin.exe File opened (read-only) \??\N: xqxin.exe File opened (read-only) \??\W: xqxin.exe File opened (read-only) \??\X: xqxin.exe File opened (read-only) \??\B: xqxin.exe File opened (read-only) \??\G: xqxin.exe File opened (read-only) \??\M: xqxin.exe File opened (read-only) \??\O: xqxin.exe File opened (read-only) \??\P: xqxin.exe File opened (read-only) \??\Q: xqxin.exe File opened (read-only) \??\R: xqxin.exe File opened (read-only) \??\S: xqxin.exe File opened (read-only) \??\T: xqxin.exe File opened (read-only) \??\V: xqxin.exe File opened (read-only) \??\Y: xqxin.exe File opened (read-only) \??\Z: xqxin.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xinxq\xqxin.exe b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe File created C:\Windows\SysWOW64\xinxq\xqxin.exe b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqxin.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xqxin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz xqxin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3624 b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe 3624 b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe 5020 xqxin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5020 xqxin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 5020 3624 b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe 83 PID 3624 wrote to memory of 5020 3624 b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe 83 PID 3624 wrote to memory of 5020 3624 b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe"C:\Users\Admin\AppData\Local\Temp\b20f56e2c8b3a9add43044c4f4a81a0a4e018ec98255d9328fa47f35807c65c3N.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\xinxq\xqxin.exe"C:\Windows\SysWOW64\xinxq\xqxin.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD54d51bc7fc9e839448763421cf088ecb2
SHA1f0de15a37b53ba3d6799fc0324fdc18ba7823d00
SHA2565cf4afd8f268fa96d9e4e997b3377aea6690ec5b5ebca165cd1897691c3882d4
SHA512680437d10ea4544e12e6b366fd09704134e711391db6ff421bd2c2964022e949fe9c60441ecea4733a824c73a7142648a6c9baf41de37813f94ef770d491745d