Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-10-2024 10:07
Static task
static1
Behavioral task
behavioral1
Sample
2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe
Resource
win10v2004-20241007-en
General
-
Target
2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe
-
Size
1.8MB
-
MD5
fa80f7584f46b97118f7398b6e36b9c8
-
SHA1
7661586fb8c492a5e40b79acc1f266e79b1d9bc2
-
SHA256
2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d
-
SHA512
946f2dba5e162e28e9b75e905978cb3f34437050b7a23f04165d2868a6770fbbb1a970b459d5f5ad95fe036134e50a6c8e9d45c6ec8e15c22b0eec61f31effd7
-
SSDEEP
49152:0f+RzhCfjKCYHxi29GkwlwklNuzu/hd8HP129I7:02NhCfeR1IFH0WhduWI7
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/596-16689-0x0000000000400000-0x0000000000755000-memory.dmp purplefox_rootkit behavioral1/memory/11056-16691-0x0000000000400000-0x0000000000755000-memory.dmp purplefox_rootkit behavioral1/memory/3504-25407-0x0000000000400000-0x0000000000755000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/596-16689-0x0000000000400000-0x0000000000755000-memory.dmp family_gh0strat behavioral1/memory/11056-16691-0x0000000000400000-0x0000000000755000-memory.dmp family_gh0strat behavioral1/memory/3504-25407-0x0000000000400000-0x0000000000755000-memory.dmp family_gh0strat -
Deletes itself 1 IoCs
pid Process 3360 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 11056 Skcsk.exe 3504 Skcsk.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: Skcsk.exe File opened (read-only) \??\L: Skcsk.exe File opened (read-only) \??\R: Skcsk.exe File opened (read-only) \??\V: Skcsk.exe File opened (read-only) \??\E: Skcsk.exe File opened (read-only) \??\H: Skcsk.exe File opened (read-only) \??\S: Skcsk.exe File opened (read-only) \??\X: Skcsk.exe File opened (read-only) \??\Y: Skcsk.exe File opened (read-only) \??\M: Skcsk.exe File opened (read-only) \??\O: Skcsk.exe File opened (read-only) \??\P: Skcsk.exe File opened (read-only) \??\T: Skcsk.exe File opened (read-only) \??\U: Skcsk.exe File opened (read-only) \??\W: Skcsk.exe File opened (read-only) \??\Z: Skcsk.exe File opened (read-only) \??\B: Skcsk.exe File opened (read-only) \??\G: Skcsk.exe File opened (read-only) \??\J: Skcsk.exe File opened (read-only) \??\K: Skcsk.exe File opened (read-only) \??\N: Skcsk.exe File opened (read-only) \??\Q: Skcsk.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Skcsk.exe 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe File opened for modification C:\Windows\SysWOW64\Skcsk.exe 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 40 IoCs
pid Process 596 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe 596 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe 596 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe 11056 Skcsk.exe 11056 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skcsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skcsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3360 cmd.exe 13024 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Skcsk.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Skcsk.exe -
Modifies data under HKEY_USERS 12 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software Skcsk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft Skcsk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum Skcsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Skcsk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Skcsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Skcsk.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Skcsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum Skcsk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie Skcsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum\Version = "7" Skcsk.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Skcsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Skcsk.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 13024 PING.EXE -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe 3504 Skcsk.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 596 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe Token: 33 3504 Skcsk.exe Token: SeIncBasePriorityPrivilege 3504 Skcsk.exe Token: 33 3504 Skcsk.exe Token: SeIncBasePriorityPrivilege 3504 Skcsk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 596 wrote to memory of 3360 596 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe 32 PID 596 wrote to memory of 3360 596 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe 32 PID 596 wrote to memory of 3360 596 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe 32 PID 596 wrote to memory of 3360 596 2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe 32 PID 11056 wrote to memory of 3504 11056 Skcsk.exe 33 PID 11056 wrote to memory of 3504 11056 Skcsk.exe 33 PID 11056 wrote to memory of 3504 11056 Skcsk.exe 33 PID 11056 wrote to memory of 3504 11056 Skcsk.exe 33 PID 3360 wrote to memory of 13024 3360 cmd.exe 35 PID 3360 wrote to memory of 13024 3360 cmd.exe 35 PID 3360 wrote to memory of 13024 3360 cmd.exe 35 PID 3360 wrote to memory of 13024 3360 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe"C:\Users\Admin\AppData\Local\Temp\2be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\2BE3F5~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:13024
-
-
-
C:\Windows\SysWOW64\Skcsk.exeC:\Windows\SysWOW64\Skcsk.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:11056 -
C:\Windows\SysWOW64\Skcsk.exeC:\Windows\SysWOW64\Skcsk.exe -acsi2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5fa80f7584f46b97118f7398b6e36b9c8
SHA17661586fb8c492a5e40b79acc1f266e79b1d9bc2
SHA2562be3f58ae31984e9f369848507f70ce72e42cad24819eb985175483a2d64d97d
SHA512946f2dba5e162e28e9b75e905978cb3f34437050b7a23f04165d2868a6770fbbb1a970b459d5f5ad95fe036134e50a6c8e9d45c6ec8e15c22b0eec61f31effd7