Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 11:17
Static task
static1
Behavioral task
behavioral1
Sample
b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe
Resource
win7-20241010-en
General
-
Target
b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe
-
Size
14.4MB
-
MD5
95064feb7a7048c6c3075d333cc2c833
-
SHA1
c47c7e9401abb433ade3364acc54fc459126a62f
-
SHA256
b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64
-
SHA512
8f7fa8c8ba279ca1a051dde44e8cbfbf18fd3ba32b3ec070fac78f3e3a38cc3c59d0d978db684fe729b4d8ecc5c7fa195362371bcd6fb919e916d512ff71414c
-
SSDEEP
393216:R4GMSngcpo7uEmqgWhXKpN2dHo79qj9l7tyO/M:R+SXu0LWMNVqT0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3732-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3732-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3732-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2812-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2812-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4952-32-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2812-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2812-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4952-34-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4952-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4952-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral2/memory/3732-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3732-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3732-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2812-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2812-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4952-32-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2812-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2812-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4952-34-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4952-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4952-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 5 IoCs
pid Process 3732 RVN.exe 2812 TXPlatforn.exe 820 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 4952 TXPlatforn.exe 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp -
Loads dropped DLL 7 IoCs
pid Process 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
resource yara_rule behavioral2/memory/3732-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3732-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3732-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3732-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2812-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2812-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2812-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4952-32-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2812-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2812-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4952-34-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4952-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4952-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4792 PING.EXE 4024 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4792 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3904 b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 3904 b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4952 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3732 RVN.exe Token: SeLoadDriverPrivilege 4952 TXPlatforn.exe Token: 33 4952 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4952 TXPlatforn.exe Token: 33 4952 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4952 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3904 b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp 4780 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3732 3904 b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 85 PID 3904 wrote to memory of 3732 3904 b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 85 PID 3904 wrote to memory of 3732 3904 b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 85 PID 3732 wrote to memory of 4024 3732 RVN.exe 89 PID 3732 wrote to memory of 4024 3732 RVN.exe 89 PID 3732 wrote to memory of 4024 3732 RVN.exe 89 PID 3904 wrote to memory of 820 3904 b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 87 PID 3904 wrote to memory of 820 3904 b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 87 PID 3904 wrote to memory of 820 3904 b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 87 PID 2812 wrote to memory of 4952 2812 TXPlatforn.exe 90 PID 2812 wrote to memory of 4952 2812 TXPlatforn.exe 90 PID 2812 wrote to memory of 4952 2812 TXPlatforn.exe 90 PID 4024 wrote to memory of 4792 4024 cmd.exe 92 PID 4024 wrote to memory of 4792 4024 cmd.exe 92 PID 4024 wrote to memory of 4792 4024 cmd.exe 92 PID 820 wrote to memory of 4780 820 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 93 PID 820 wrote to memory of 4780 820 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 93 PID 820 wrote to memory of 4780 820 HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe"C:\Users\Admin\AppData\Local\Temp\b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4792
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exeC:\Users\Admin\AppData\Local\Temp\HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\is-HJPI9.tmp\HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp"C:\Users\Admin\AppData\Local\Temp\is-HJPI9.tmp\HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp" /SL5="$40092,14201274,79360,C:\Users\Admin\AppData\Local\Temp\HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
588KB
MD5b8733759585fcb8572db7d9d31ab1ea4
SHA1f49dd023d757bdcfeca53c45cd6ee732d434eeec
SHA256cc85ddca16f99f4c4d989a0a3dacef220c7e0d48d13f23c2421fcf07a178673d
SHA51234f50520668cfbf96b6268f2f89000ca43a83d1001066c42760247415a513391d23bd135e31325cf3232256ebfb036370973674b75246539fe4f5409dff8313a
-
C:\Users\Admin\AppData\Local\Temp\HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.exe
Filesize13.9MB
MD5447e1b626aea6a51ffd1215bc3dbb0d8
SHA182efb978478b1b83a455312be5676055d75528d4
SHA2568caeb9b0319dfbdbaabdd5557f0e8e72024d4b943ad28cbe4ae7ae881cc9e6d5
SHA5121134e4f68e6ff2a02f10a2b8dddfae4c0203962de3b1843a07753519ab21ed3f15f022342a637c60dea153141c9f4fa40f5467f90e4d46aef2315a222cad6974
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
52KB
MD552de38fbc332686af131de7620d7d34d
SHA15224fe8b8b6caede36ef1d41a83237dbe062bf91
SHA25690b962859001a839d7f5687b60178422e94becfa4f8237870aa25f9b57501574
SHA512e32ca9fa7f955db9b1a199847b7add0b2bb721dea052d62306d7cca991ade8122585ff9f7344cb7579a9df2e3cbcc4f63d47a1a998d2ebd44f3777075549ca85
-
Filesize
34KB
MD545c7a63155be0e7a5e055d41c126db56
SHA116b56c1dea13180bdcb5e02648f3c342e062b6fb
SHA25680c1708f51067e13ae08d2cac2cb3cb486556895be4704bba55619c85f19c506
SHA51290c125fdb3b460503e5579021078b0e5be751249f13c90a0f4711f5910ae1a71b27315abdc75ebc79e0ad1b207fa0b72f60aabb7fc7924dc1b252f1c32273095
-
Filesize
3KB
MD546e0e88a0c413dbb0e5e69041e39f1ae
SHA1122210d7c99d2234f2d95147151ae049d97e9705
SHA2565e4b944569db42833dbf0da974942e0a5b82a5560165fe5f65477c0c2443d546
SHA5123a8dcdfbdcd6b1d8b7cdd26dd603df3072372ab0bcff88a656a68a1b89e5785bdd22c489fd325dc92aa2bc9aa36af23c46265d4771c5c27cd5efc5e909c014b9
-
Filesize
8KB
MD521936187eca89de7566b77ac6ac2482a
SHA1618a90ef91af3edb1dd0d42f04a19d2e363c7217
SHA256928668e2c16450ab41b6ed50d4314ed7171b7902980f6f741ab3b080fb564fbf
SHA51232f89e308bec045fc1671cd8002b1a973533c167b373bdb6fb4ac86ba312ed3bb26e19e79afc71c3fd93e0fceb7328a48303bc9331f854bdd052e439ba63080c
-
Filesize
10KB
MD59c497a6cfb4035ae006619919e23e45c
SHA1d2b1534ce30a90ee962976b8921bea6eb80846e7
SHA25620646bf003ca8d986737e66ef6200154af7376a69d908777f5c9c37a513c0d8a
SHA512e92f58ae4c4cf81ec49e1386841be2b74f00da51cc282345dd4af1c430956b9eda3ad3a60d642eea448eff69a0fa7775bf99363efc31fcb09fe411c5dae972e5
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
11KB
MD5c93e37ebe583a04dc338de24b391980d
SHA178cc694a47093ff03bb06d84a3fac147d329094a
SHA2564ea9c6483d0a66b9d94c1f1b28187fe7c4ebe419c057d18518ea35a506134b97
SHA51278b8cd8bd1fe0736424971de713dc94bdcdb3d190628bbf1793b944ff0eaf956013c2c3efdd2d1e065745c712d3ad90f075980a8e9e54c8c83ef83f62cac8ba7
-
Filesize
2KB
MD5b9eefb7394aa12a1b48ad06ee28d4db3
SHA1d83a02204505ee72c06a2c47fade52b9c6247efd
SHA256837bb81aa013287fccf7342d5c183a20ebd78fbb83ea92d531d074f593cea70f
SHA512f9ede2a0b114bec94ee2fdce2b49ca68f7f8e2614d4706381c3280cf63b9acf8d1818d1cb756cb2aa96b28251750d68cf93ab4d496b4e7ddeccb8e5f371a56f5
-
C:\Users\Admin\AppData\Local\Temp\is-HJPI9.tmp\HD_b269129685594e938b188e15b21651a1ffc2d68255153e5cd5ae60c9e9cf2d64.tmp
Filesize943KB
MD5cba91ff9cf399db23793b2a1a064b2d6
SHA1a2fd8939f1d5be08fc0b4c0f5adfee270fb8871b
SHA256ee6754d650fc0796d894f7dd39c9cfefcc649b1e26b21cbd6ef5c5be44853f80
SHA5126c79ded41365509503c4a973bde3a1bca31a64c83d1a755f1ae9fcd87391aaddbc2549f77e944f832eade0f017436446e19d616cc1604c346f8717abefc3be7b