Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe
Resource
win7-20240903-en
General
-
Target
a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe
-
Size
2.5MB
-
MD5
a65507e62ae699fa9a942ead9a4ae9f0
-
SHA1
c4f52a0481b9b64bfce933f4343d26a9a84db33f
-
SHA256
a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96c
-
SHA512
32547172a7adb29cd3a5cf2403ad7cbbe0216eb358c1f67b4e90fcb98fbdc35b9f6a2845d9d8da018bee64b38ff64522022419b01f67fc1a6b71da93c157401d
-
SSDEEP
49152:u1vqjdPQ31PZ93aaYl1gm5TxsIGm4GZeED1jFayV4PxDZmc7iNEG:u1vqjY1PrqaYlvNFGvApD1jFZV4xZm+W
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4820-8-0x0000000010000000-0x0000000010199000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4820-8-0x0000000010000000-0x0000000010199000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 4820 xqxin.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: xqxin.exe File opened (read-only) \??\J: xqxin.exe File opened (read-only) \??\L: xqxin.exe File opened (read-only) \??\R: xqxin.exe File opened (read-only) \??\U: xqxin.exe File opened (read-only) \??\Z: xqxin.exe File opened (read-only) \??\G: xqxin.exe File opened (read-only) \??\M: xqxin.exe File opened (read-only) \??\Y: xqxin.exe File opened (read-only) \??\W: xqxin.exe File opened (read-only) \??\E: xqxin.exe File opened (read-only) \??\H: xqxin.exe File opened (read-only) \??\K: xqxin.exe File opened (read-only) \??\P: xqxin.exe File opened (read-only) \??\Q: xqxin.exe File opened (read-only) \??\S: xqxin.exe File opened (read-only) \??\T: xqxin.exe File opened (read-only) \??\X: xqxin.exe File opened (read-only) \??\I: xqxin.exe File opened (read-only) \??\N: xqxin.exe File opened (read-only) \??\O: xqxin.exe File opened (read-only) \??\V: xqxin.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xinxq\xqxin.exe a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe File opened for modification C:\Windows\SysWOW64\xinxq\xqxin.exe a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe File opened for modification C:\Windows\SysWOW64\xinxq\xqxin.exe xqxin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xqxin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4684 cmd.exe 1236 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xqxin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz xqxin.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1236 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4308 a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe 4308 a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe 4820 xqxin.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 4820 xqxin.exe Token: SeIncBasePriorityPrivilege 4820 xqxin.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4820 xqxin.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4308 wrote to memory of 4820 4308 a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe 89 PID 4308 wrote to memory of 4820 4308 a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe 89 PID 4308 wrote to memory of 4820 4308 a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe 89 PID 4820 wrote to memory of 4684 4820 xqxin.exe 100 PID 4820 wrote to memory of 4684 4820 xqxin.exe 100 PID 4820 wrote to memory of 4684 4820 xqxin.exe 100 PID 4684 wrote to memory of 1236 4684 cmd.exe 102 PID 4684 wrote to memory of 1236 4684 cmd.exe 102 PID 4684 wrote to memory of 1236 4684 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe"C:\Users\Admin\AppData\Local\Temp\a35b9d5123335a57d2995ad24900396cdbbd1859215a03fa2324b980e8eca96cN.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\xinxq\xqxin.exe"C:\Windows\SysWOW64\xinxq\xqxin.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Windows\SysWOW64\xinxq\xqxin.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1236
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2152,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:81⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD570006fffc23d4d0da84d7718d5047397
SHA163024d1f3ce63c38d4d02bf5060d308b028a0913
SHA25674d9d7e91ea5d958e50380f0e672e8638302de7fa13aa2c5c4f1625c27bc7ea2
SHA512d7fd4ea5b57f8d05507c812075b899b95b7664c0f09adca6c7534ce74c0696b1aab74deabaf7b5ff40e00ef51b427c17c38593e1d6fce21160ce8ac7145befa9