Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 18:30
Static task
static1
Behavioral task
behavioral1
Sample
8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe
Resource
win7-20240903-en
General
-
Target
8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe
-
Size
1.7MB
-
MD5
caf67a069417942f7dc464483fa221f3
-
SHA1
45ea4ac98f0df824a206be6560a15546d711ae07
-
SHA256
8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67
-
SHA512
92287a706b29dd7778c979b0468f677c5c6b2645dbc073105687e668fa92ba7f044baaea9618c60226e9ac46a8e6a2a928f53dc415875d548b32dd7c41fddc2a
-
SSDEEP
12288:AfznAsTJY/1o26kw6BEVNsa4gOYKikqiCUDqgsX+QOpda8RUTMfgVSl54DeSWKVB:4TF6BA5+J/aQgVSlarWMWieUUR/K
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2476-0-0x0000000010000000-0x00000000101A6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2476-0-0x0000000010000000-0x00000000101A6000-memory.dmp family_gh0strat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation 8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3732 cmd.exe 852 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 852 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2476 8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2608 2476 8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe 87 PID 2476 wrote to memory of 2608 2476 8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe 87 PID 2476 wrote to memory of 2608 2476 8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe 87 PID 2476 wrote to memory of 3732 2476 8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe 88 PID 2476 wrote to memory of 3732 2476 8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe 88 PID 2476 wrote to memory of 3732 2476 8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe 88 PID 3732 wrote to memory of 852 3732 cmd.exe 90 PID 3732 wrote to memory of 852 3732 cmd.exe 90 PID 3732 wrote to memory of 852 3732 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe"C:\Users\Admin\AppData\Local\Temp\8d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\8D2887~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5caf67a069417942f7dc464483fa221f3
SHA145ea4ac98f0df824a206be6560a15546d711ae07
SHA2568d28870afc570a9d6b5acde54701060c28639759ac8d998a1caeeb980c880e67
SHA51292287a706b29dd7778c979b0468f677c5c6b2645dbc073105687e668fa92ba7f044baaea9618c60226e9ac46a8e6a2a928f53dc415875d548b32dd7c41fddc2a