Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe
Resource
win7-20240708-en
General
-
Target
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe
-
Size
4.1MB
-
MD5
628667cea08aed36ee5c282b81f30cc8
-
SHA1
5362fa8e9b654863251b7768389ca5f05a3e6ea0
-
SHA256
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02
-
SHA512
21fd13e45caa65093dcc193fccf54a679146e3693102081b80ad2e4796487d1298c5b99dd830f4d3152b9acdbb21f7e171b785ee8208516cad2f77dbb12fc789
-
SSDEEP
98304:IFk+Zmo3roc///////J5pW0gf3bTh6a+JBAUZLfmF:4ZNpM3bN6PJVK
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/5060-72-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5060-71-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2256-85-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2256-86-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4384-95-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4384-98-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4384-100-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 8 IoCs
Processes:
resource yara_rule behavioral2/memory/5060-72-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023cbb-76.dat family_gh0strat behavioral2/memory/5060-71-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2256-85-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2256-86-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4384-95-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4384-98-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4384-100-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
Processes:
r.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñ\Parameters\ServiceDll = "C:\\Windows\\system32\\240632359.bat" r.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
Processes:
OD¼ì²â.exe47.exer.exeTXPlatforn.exeTXPlatforn.exeÖ÷¶¯·ÀÓù·þÎñ.exepid Process 1116 OD¼ì²â.exe 5060 47.exe 3480 r.exe 2256 TXPlatforn.exe 4384 TXPlatforn.exe 4356 Ö÷¶¯·ÀÓù·þÎñ.exe -
Loads dropped DLL 3 IoCs
Processes:
r.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñ.exepid Process 3480 r.exe 2760 svchost.exe 4356 Ö÷¶¯·ÀÓù·þÎñ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exedescription ioc Process File opened for modification \??\PhysicalDrive0 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exe47.exer.exedescription ioc Process File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñ.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñ.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatforn.exe 47.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe 47.exe File created C:\Windows\SysWOW64\240632359.bat r.exe File opened for modification C:\Windows\SysWOW64\ini.ini r.exe -
Processes:
resource yara_rule behavioral2/memory/4440-0-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-21-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-31-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-47-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-45-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-41-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-53-0x00000000033F0000-0x0000000003430000-memory.dmp upx behavioral2/memory/4440-37-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-35-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-34-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-29-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-27-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-25-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-23-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-17-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-13-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-11-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-9-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-7-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-5-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-44-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-3-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-19-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-15-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-2-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/4440-1-0x00000000028F0000-0x000000000292E000-memory.dmp upx behavioral2/memory/5060-72-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5060-71-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5060-70-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2256-85-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2256-86-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2256-83-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4384-95-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4384-98-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4384-100-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4440-105-0x00000000028F0000-0x000000000292E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exeOD¼ì²â.execmd.exer.exe47.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñ.execmd.exeTXPlatforn.execmd.exePING.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OD¼ì²â.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ö÷¶¯·ÀÓù·þÎñ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 3364 cmd.exe 1052 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exepid Process 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid Process 4384 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
47.exeTXPlatforn.exedescription pid Process Token: SeIncBasePriorityPrivilege 5060 47.exe Token: SeLoadDriverPrivilege 4384 TXPlatforn.exe Token: 33 4384 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4384 TXPlatforn.exe Token: 33 4384 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4384 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exepid Process 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exeOD¼ì²â.execmd.execmd.exe47.exeTXPlatforn.execmd.exesvchost.exedescription pid Process procid_target PID 4440 wrote to memory of 1116 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe 84 PID 4440 wrote to memory of 1116 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe 84 PID 4440 wrote to memory of 1116 4440 f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe 84 PID 1116 wrote to memory of 1660 1116 OD¼ì²â.exe 88 PID 1116 wrote to memory of 1660 1116 OD¼ì²â.exe 88 PID 1116 wrote to memory of 1660 1116 OD¼ì²â.exe 88 PID 1116 wrote to memory of 3476 1116 OD¼ì²â.exe 89 PID 1116 wrote to memory of 3476 1116 OD¼ì²â.exe 89 PID 1116 wrote to memory of 3476 1116 OD¼ì²â.exe 89 PID 1660 wrote to memory of 5060 1660 cmd.exe 92 PID 1660 wrote to memory of 5060 1660 cmd.exe 92 PID 1660 wrote to memory of 5060 1660 cmd.exe 92 PID 3476 wrote to memory of 3480 3476 cmd.exe 93 PID 3476 wrote to memory of 3480 3476 cmd.exe 93 PID 3476 wrote to memory of 3480 3476 cmd.exe 93 PID 5060 wrote to memory of 3364 5060 47.exe 97 PID 5060 wrote to memory of 3364 5060 47.exe 97 PID 5060 wrote to memory of 3364 5060 47.exe 97 PID 2256 wrote to memory of 4384 2256 TXPlatforn.exe 98 PID 2256 wrote to memory of 4384 2256 TXPlatforn.exe 98 PID 2256 wrote to memory of 4384 2256 TXPlatforn.exe 98 PID 3364 wrote to memory of 1052 3364 cmd.exe 100 PID 3364 wrote to memory of 1052 3364 cmd.exe 100 PID 3364 wrote to memory of 1052 3364 cmd.exe 100 PID 2760 wrote to memory of 4356 2760 svchost.exe 108 PID 2760 wrote to memory of 4356 2760 svchost.exe 108 PID 2760 wrote to memory of 4356 2760 svchost.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe"C:\Users\Admin\AppData\Local\Temp\f79168af038b2168ff426ecc439cd082c272e7543fae5e1c72e563630caeee02.exe"1⤵
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\OD¼ì²â.exeC:\Users\Admin\AppData\Local\Temp\\OD¼ì²â.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\47.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\47.exeC:\Users\Admin\AppData\Local\Temp\47.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\47.exe > nul5⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.16⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1052
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\r.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\r.exeC:\Users\Admin\AppData\Local\Temp\r.exe4⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3480
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñ"1⤵PID:2064
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñ"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñ.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñ.exe "c:\windows\system32\240632359.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4356
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD520b05a93c5de23f1fe6c87f6bc4dabd5
SHA18cfc236635ec6b7ce78da31d098bc42cfbe89fa0
SHA2563aa540780b32d22430706ac275b967c2f93d308f1f57fb794b67f0941fc6fe89
SHA5124786eeea8d57c5cb1b655c11795af2d75ba7620b493c37d01685574af2749f32589963fb78fadd621ea4d8d3b9616bb31a4e8cd8675dcbb5292c22ad040831ac
-
Filesize
586KB
MD520bbaea0f63e79ddfd42da8cc35763e0
SHA1bf48a4a1bd8e8b611bbe57a05d5d9e406d7bf9a6
SHA256fae6449a0d0a6fbc4f1fc2ed341a6c10d81e07d864677116626b04f9ceb83c46
SHA512532de5f15703de5c22c0593074e69f754f7590ede1529e774caa9cef133d9c228555b24e168645fa0d99ecaa18e78c56e5a17514e8158dcabca8d824a9af876f
-
Filesize
93KB
MD54992f3334ad36ff3f61a3b2e3ba7336c
SHA161d93ffde435d0d6b1ff0b4fdeef65d79d1f06e8
SHA256f6b53c8cbef17932ef640bb83b07e56067ffaa582330bb1f68001194a84d1641
SHA5124772747b159d887ec183c17142dab4bff3595d988a9fa1d28463b82a96f7da0069765cf9e71f1eb33d97c66eb2756103bdd6cc05693f6d76a2ba823ec128d3e0
-
Filesize
50KB
MD54f0bd659e0f0ac42e16ce42a52a1af11
SHA19af198de5661cee25cdfe961e1f2261c73331bad
SHA25697f49628921ada37adea7396f708135cbc80c7bfffcc4e68786d9afdf32450d8
SHA51204801506bb388bcfd2f5fbb35ab1b51777a7cdb46cef927a07d25fd583cceae136ab1e11ae7408e717afe571793efa8393c1892469fc2ae5e23c35bc656b44a8
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641