Analysis

  • max time kernel
    136s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 08:26

General

  • Target

    62856958c7571eacf182e9b38f59189d7681ac39513fe3d3778f4b0be4e6ede1.exe

  • Size

    248KB

  • MD5

    dc38da17b0f0cc99f4831aba153bb28b

  • SHA1

    b756ef1b0369e0822ed248363ae6c577d53a7834

  • SHA256

    62856958c7571eacf182e9b38f59189d7681ac39513fe3d3778f4b0be4e6ede1

  • SHA512

    2c5349b9555c7ddaa300652173eef422fdcfbe464b8f8fca9e2ac53088d860eb996c763506d8ca1fef9ae9a0fb4d9574c6faf164050deb8f27646607f1699f8c

  • SSDEEP

    3072:whLXC/6ZxsIDrok7gJWyzebqkqNKktNXBPmaoTZ2xZS21+GCI2ekEbkAsH3mYBoj:whL46Z6IDvgJM5QmahxZS2EGCtr3X7F

Malware Config

Signatures

  • Detect PurpleFox Rootkit 1 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Purplefox family
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62856958c7571eacf182e9b38f59189d7681ac39513fe3d3778f4b0be4e6ede1.exe
    "C:\Users\Admin\AppData\Local\Temp\62856958c7571eacf182e9b38f59189d7681ac39513fe3d3778f4b0be4e6ede1.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Users\Public\Windows\RuntimeBroker.exe
      "C:\Users\Public\Windows\RuntimeBroker.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Windows\RuntimeBroker.exe

    Filesize

    625KB

    MD5

    dec397e36e9f5e8a47040adbbf04e20b

    SHA1

    643f2b5b37723ebc493ba6993514a4b2d9171acb

    SHA256

    534fd2d6da5c361831eb7fbfd1b203fbb80cd363d33f69abc4eafc384bafdc5e

    SHA512

    b2cdd06c044ae8b4cf7ae5c32b65f2b03f733b93061b9076cf29103da53573460c7e5d53da72220055cdafb084c63019d4a134d562a06af81c1eaad30892845b

  • C:\Users\Public\Windows\UnityPlayer.dll

    Filesize

    1.6MB

    MD5

    e22704eb1f2d0773ec177ac4b8fa3185

    SHA1

    c0ab768d145525be8b6541de6aca8e19277e0771

    SHA256

    af3d583e35380b13afc52996cd53916f848eb409c9273f659f3ba0e9adbe9c1b

    SHA512

    0dfc92d2366cfe3aeea659dcb2fc2cd3f55bd8577c70bfb1d59f80e7d3f2a11695a29a4ec70b8428223d161d261409c3ddb7185daad79515726f72cc8dc47f1b

  • memory/5016-15-0x0000000010000000-0x00000000101A4000-memory.dmp

    Filesize

    1.6MB

  • memory/5016-21-0x00000000774A1000-0x00000000775C1000-memory.dmp

    Filesize

    1.1MB