Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2024, 02:07

General

  • Target

    yuanchangkuirr-intrallar.msi

  • Size

    72.3MB

  • MD5

    31e8ef3c0591e3ce82cb1c43fb6459c2

  • SHA1

    2adc3a5470d7e7507c60e6bf88d86985b2d3a7b9

  • SHA256

    9e0543dbde32aeacb27324fc070be63ae7bf679fbe69a4836e3dab627812a7b8

  • SHA512

    c1607b5a051fe034378dee8c27aca1effbdf4ab985a500160f2260403bace6f5575117e73a21878ec3f88d1bde49f56cc99184012cb66d1cb2bdc2a7defb4994

  • SSDEEP

    1572864:DNDFH5QOjDdexAgZt/qNOU1bpJh11+exX8t6iwwdM1ZE0d+LH:1xjDdKAqFqQCJh11/xYP50d+7

Malware Config

Signatures

  • Detect PurpleFox Rootkit 4 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 8 IoCs
  • Executes dropped EXE 9 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\yuanchangkuirr-intrallar.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1912
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4724
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2688
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding DD8241C19AC5144B998AE78F8C9B5AC0 E Global\MSI0000
      2⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\AnalyzeGentleExplorer'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        PID:1060
      • C:\Program Files\AnalyzeGentleExplorer\KXwXckjFEiVp.exe
        "C:\Program Files\AnalyzeGentleExplorer\KXwXckjFEiVp.exe" x "C:\Program Files\AnalyzeGentleExplorer\jtsQyBozxwOIHmIoteVO" -o"C:\Program Files\AnalyzeGentleExplorer\" -pjMgmEjeKlhGKaGgJyBsZ -y
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4524
      • C:\Program Files\AnalyzeGentleExplorer\fUsKbQztGnwa.exe
        "C:\Program Files\AnalyzeGentleExplorer\fUsKbQztGnwa.exe" -number 105 -file file3 -mode mode3 -flag flag3
        3⤵
        • Drops file in Program Files directory
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3332
      • C:\Program Files\AnalyzeGentleExplorer\SunloginClient15544x64.exe
        "C:\Program Files\AnalyzeGentleExplorer\SunloginClient15544x64.exe"
        3⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Program Files\AnalyzeGentleExplorer\SunloginClient15544x64.exe
          "C:\Program Files\AnalyzeGentleExplorer\SunloginClient15544x64.exe" --mod=install --admin=1
          4⤵
          • Executes dropped EXE
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:3480
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:2164
  • C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.exe
    "C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.exe" install
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:2748
  • C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.exe
    "C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.exe" start
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    PID:1876
  • C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.exe
    "C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.exe"
    1⤵
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Program Files\AnalyzeGentleExplorer\fUsKbQztGnwa.exe
      "C:\Program Files\AnalyzeGentleExplorer\fUsKbQztGnwa.exe" -number 274 -file file3 -mode mode3 -flag flag3
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Program Files\AnalyzeGentleExplorer\fUsKbQztGnwa.exe
        "C:\Program Files\AnalyzeGentleExplorer\fUsKbQztGnwa.exe" -number 362 -file file3 -mode mode3 -flag flag3
        3⤵
        • Enumerates connected drives
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e57ee58.rbs

          Filesize

          7KB

          MD5

          3c00e912b8897ba94133f9a1e7110e3a

          SHA1

          49c68ac3919e51c63728b98bf1fb032ac70093d7

          SHA256

          95a48a7c2470d1f66f27691de6d84627ef9f99c9a3b91c2285cf6d2a0d2cf6dc

          SHA512

          a06b72be4a553960e213d6e68a148a21789084587b88f558b86e9a35153e27ce9cac989e53dad92e69f8631bc7ffc2f16e9ac7674410a3a60befc85a00eed9bc

        • C:\Program Files\AnalyzeGentleExplorer\KXwXckjFEiVp.exe

          Filesize

          577KB

          MD5

          11fa744ebf6a17d7dd3c58dc2603046d

          SHA1

          d99de792fd08db53bb552cd28f0080137274f897

          SHA256

          1b16c41ae39b679384b06f1492b587b650716430ff9c2e079dca2ad1f62c952d

          SHA512

          424196f2acf5b89807f4038683acc50e7604223fc630245af6bab0e0df923f8b1c49cb09ac709086568c214c3f53dcb7d6c32e8a54af222a3ff78cfab9c51670

        • C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.exe

          Filesize

          832KB

          MD5

          d305d506c0095df8af223ac7d91ca327

          SHA1

          679cb4c763c84e75ccb0fa3475bd6b7a36e81c4a

          SHA256

          923111c7142b3dc783a3c722b19b8a21bcb78222d7a136ac33f0ca8a29f4cb66

          SHA512

          94d369a4db88bff9556a1d7a7fb0188ed935c3592bae09335542c5502ec878e839177be63ac3ab4af75d4dc38a3a4f5d0fd423115ac72cf5dd710c59604db796

        • C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.wrapper.log

          Filesize

          302B

          MD5

          19f8478776066aaf01c1d635d6f464c7

          SHA1

          d86d22928b0b7ac786356c8b6dded2ec064c952b

          SHA256

          47950fde831d9c151a50a96dae3acca28c2dd48f55aabe8ee90e4872542be5c9

          SHA512

          435bfa33c74a482261e352427a24f462d706e6413ce2322ec7fae9456447fa1806287f2a41b2a2b7bfe3f142445975e47bd3a872c4322771b26a7ae479e2b5ca

        • C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.wrapper.log

          Filesize

          476B

          MD5

          49dd6961435700f48320840190fb2a75

          SHA1

          c9f629ba3320b72a7569fbdb9e6a6f17b8bada1e

          SHA256

          757a3e7bbbd66157da25e83f3f04ad9da84c4a45826a300ce990320aec3c2e4a

          SHA512

          8dfb7f35b1427acbf992c11c31bd09f031f00c4f67690d45811519b7a12d416d668d1c627e6074091b3eb934d4c73868462a7f95edda46d2250049511dd2331a

        • C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.wrapper.log

          Filesize

          660B

          MD5

          e489360fa7033a947670c2a3859f274c

          SHA1

          00b339a8083bcd27ab5f91bf9f1884ffd411533e

          SHA256

          1ec2e234e1f3a27f0426b8b2b4ba4553392244e82a616464e227994085cac6b0

          SHA512

          284b307ae8619b4279905c109f4e1b43a23c8d418b185045f2e6ab35be8e19d918a7bbc5d25adcfe405bb06d162cc8ec8ad49e1e3b607c3c32ef33b0c762f6b4

        • C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.wrapper.log

          Filesize

          806B

          MD5

          64c8963f11bc5ae5eb571dee62fd8277

          SHA1

          c6cc8967c0648abfd3cf555913485bac27ccd393

          SHA256

          6186127241d2481fa46ed0689b0b665f26d21e915ef5fd8eb110f4e0a8d2a082

          SHA512

          12479e88352ca9a84ac0e4beb954144ce3065b57026fe56101f486dcf9d40c0498d036c6d6b916d03ddfbc4557e32df1f8cce8693ba9a4430fbac2b4fb29bf04

        • C:\Program Files\AnalyzeGentleExplorer\KigOyawRpuIW.xml

          Filesize

          463B

          MD5

          037dfea35d309b76b100357b1911aaf7

          SHA1

          82f3abd9edf807226ec28e6cf8356e3549e9bd81

          SHA256

          ad6f19216c1ca04185cdcaf257c530f86edde443ebd8d716cf6092b1172ffb33

          SHA512

          dae7819df2ab7eae72602551bd0fcfd2bb47f7c194c54eb1f7aa03c1d2351598254297bc5d72f5c6a47bf0904f3e11aafa9718edbc97b2773df8f88d57a86c77

        • C:\Program Files\AnalyzeGentleExplorer\fUsKbQztGnwa.exe

          Filesize

          2.9MB

          MD5

          a2e29c5a531ca5fdf5d4c7e75ba2748c

          SHA1

          1709ea8be99923c6ee4eb369e3971e3522d67f36

          SHA256

          ef86954f2831682faf3655901cf82afe0d7d6fc62e8335a2f508af5d03f03d5c

          SHA512

          e4fee7e410f8f199aa79f014290c0312d720fdb92a6efc48db5badea4fa4610bf344f23d3b7516b2a0e181aa8b27b00e446665a83de4b2d0acfa2e664df64434

        • C:\Program Files\AnalyzeGentleExplorer\jtsQyBozxwOIHmIoteVO

          Filesize

          2.1MB

          MD5

          5aba1a676ca0de4994c623060e05f946

          SHA1

          e792c676bdbecd6baf1516fd3adbba06764aec98

          SHA256

          0a9d3dee1cf01c5f909c19e2821975397106b70581bc32c845ae9ef584bd1c32

          SHA512

          55bc57941e1f76844881eecd56f65b35c2f7eff614a02a47a0f6b5ab41d2a4512b9b970fd658652b8fc56a07a78b46ce2c246798d82f5d256a80f5025ac5d6b4

        • C:\Users\Admin\AppData\Local\Temp\check_sign_test.log

          Filesize

          310B

          MD5

          c256dc950a96c711ae515ce274a3c38a

          SHA1

          e2a639888d3faf686be8ac6f811f76e6915228eb

          SHA256

          930ed7283301dcbaac640c35c47f6febea808e64b6e5bd2f51863551aed2011f

          SHA512

          24d8f26d83c410182fd6787806d01bcf0742748d00b793d27c55e5795a50d862275e9fa3dd8004935bc7427f1d0946949194c9ee2d8cd8e04e041a4db2051a67

        • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\KigOyawRpuIW.exe.log

          Filesize

          1KB

          MD5

          122cf3c4f3452a55a92edee78316e071

          SHA1

          f2caa36d483076c92d17224cf92e260516b3cbbf

          SHA256

          42f5774d1ee4cae5d7a4e83970da42bb17e61ae93c312247211b5ee3535662e0

          SHA512

          c98666fb86aaff6471c0a96f12f037b9a607579c5891c9d7ba8cd4e90506ca7aa5b5f6264081d25f703c88fb69d8e2cd87809d508e771770550d0c5d4d17d91c

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          24.1MB

          MD5

          00f9f07b5b777f929f291967fd138893

          SHA1

          45eb865dee087935ac48c94a68406048379a11e0

          SHA256

          08a42c6344dca1b8afd6842f67d4262114d5e0b7287ff2fe988f7ac3abaee690

          SHA512

          87cba2ac8f7ac2a71e4c3cfffb5aa88810c1a584455ac3841079c0ba0cca03459f6ff3ce9d9f2ca160e9e25027937cfd34933b4cee2f31e3d6796733c0672ace

        • \??\Volume{f0eec59f-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{5e31f0f0-2ae5-4009-8f46-63b2b362237b}_OnDiskSnapshotProp

          Filesize

          6KB

          MD5

          fcc4a29ccf00874de48bb1a79d388994

          SHA1

          920fa06b831cea8ad88ef89a2485021ea0e78433

          SHA256

          b4a77e7b5f73f6dab8e54336d123d0705cf60072f443202285601ddf00dbfe1b

          SHA512

          c1b8e0d6c48ba9c6cec33a3e5746509d06e735718dd8b760e5d5eb4aede3f00436141ac054a55c1c5ef672377a97d33a17d6c36ae9c5bbbbfaa54bdb0e2c4284

        • memory/2284-54-0x00007FF776730000-0x00007FF777730000-memory.dmp

          Filesize

          16.0MB

        • memory/2748-45-0x0000000000610000-0x00000000006E6000-memory.dmp

          Filesize

          856KB

        • memory/3332-29-0x00000000299D0000-0x00000000299FC000-memory.dmp

          Filesize

          176KB

        • memory/4924-79-0x000000002B880000-0x000000002B8C6000-memory.dmp

          Filesize

          280KB

        • memory/4924-81-0x000000002BD00000-0x000000002BEBC000-memory.dmp

          Filesize

          1.7MB

        • memory/4924-83-0x000000002BD00000-0x000000002BEBC000-memory.dmp

          Filesize

          1.7MB

        • memory/4924-84-0x000000002BD00000-0x000000002BEBC000-memory.dmp

          Filesize

          1.7MB

        • memory/4924-85-0x000000002BD00000-0x000000002BEBC000-memory.dmp

          Filesize

          1.7MB