Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe
Resource
win7-20241010-en
General
-
Target
3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe
-
Size
12.0MB
-
MD5
9e2fa902bb8be71f58f6c98bb8fa7838
-
SHA1
f6ab4f05204fa2eca061397e129734c356c2576f
-
SHA256
3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234
-
SHA512
c66944eade0935bae33cc87e061fefa94ef88bcd9d9a3b5cf913d4745462f2faa1976f5223f60bb4381de1dc45b74c84c34441c6661254661950a2a3ed97bf67
-
SSDEEP
196608:NWT9nO7j4adWhxSd/FUpoWyKAozKY4TPLKAouKn:v7jjdWxu/mpodKACXCzKATY
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1412-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1412-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1412-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3460-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3460-17-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3828-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3828-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3460-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3828-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/3460-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/1412-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1412-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1412-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3460-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3460-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023cad-24.dat family_gh0strat behavioral2/memory/3828-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3828-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3460-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3828-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3828-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/3460-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
Processes:
svchos.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240630828.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 6 IoCs
Processes:
svchost.exeTXPlatforn.exesvchos.exeTXPlatforn.exeHD_3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid Process 1412 svchost.exe 3460 TXPlatforn.exe 2236 svchos.exe 3828 TXPlatforn.exe 4712 HD_3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 4064 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
Processes:
svchos.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid Process 2236 svchos.exe 2296 svchost.exe 4064 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchost.exesvchos.exedescription ioc Process File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240630828.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe -
Processes:
resource yara_rule behavioral2/memory/1412-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1412-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1412-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1412-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3460-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3460-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3828-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3828-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3460-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3828-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3828-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3460-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/3460-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
Processes:
3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exedescription ioc Process File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exesvchos.exesvchost.exeHD_3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exesvchost.exeTXPlatforn.execmd.exePING.EXEÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 396 cmd.exe 4044 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exepid Process 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid Process 3828 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exeTXPlatforn.exedescription pid Process Token: SeIncBasePriorityPrivilege 1412 svchost.exe Token: SeLoadDriverPrivilege 3828 TXPlatforn.exe Token: 33 3828 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3828 TXPlatforn.exe Token: 33 3828 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 3828 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exepid Process 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exesvchost.exeTXPlatforn.execmd.exesvchost.exedescription pid Process procid_target PID 1448 wrote to memory of 1412 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 84 PID 1448 wrote to memory of 1412 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 84 PID 1448 wrote to memory of 1412 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 84 PID 1412 wrote to memory of 396 1412 svchost.exe 88 PID 1412 wrote to memory of 396 1412 svchost.exe 88 PID 1412 wrote to memory of 396 1412 svchost.exe 88 PID 1448 wrote to memory of 2236 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 89 PID 1448 wrote to memory of 2236 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 89 PID 1448 wrote to memory of 2236 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 89 PID 3460 wrote to memory of 3828 3460 TXPlatforn.exe 90 PID 3460 wrote to memory of 3828 3460 TXPlatforn.exe 90 PID 3460 wrote to memory of 3828 3460 TXPlatforn.exe 90 PID 396 wrote to memory of 4044 396 cmd.exe 94 PID 396 wrote to memory of 4044 396 cmd.exe 94 PID 396 wrote to memory of 4044 396 cmd.exe 94 PID 1448 wrote to memory of 4712 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 96 PID 1448 wrote to memory of 4712 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 96 PID 1448 wrote to memory of 4712 1448 3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe 96 PID 2296 wrote to memory of 4064 2296 svchost.exe 97 PID 2296 wrote to memory of 4064 2296 svchost.exe 97 PID 2296 wrote to memory of 4064 2296 svchost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe"C:\Users\Admin\AppData\Local\Temp\3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\HD_3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exeC:\Users\Admin\AppData\Local\Temp\HD_3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4712
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:1244
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240630828.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4064
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_3fa892e7dc4c2e08bf9fafbd5f672fca9b4be259b4333398fd0674732d87f234.exe
Filesize10.5MB
MD53db529e99290bb576f42d9031fca7054
SHA1651a3190ccaa05a44f34e90bc6cd814315e2aad1
SHA256a9a4a6422aea5c2eb914a45c56f02e59fa3142e04f9ab36d623c240f5c3765c1
SHA512ae74e499a0b55f9bec1c2580788eda058fcf1eed5de96cecc50fa2206951319052e56429dd79240d7aa667e86c79a08757fe26841b88f220c0470322d10ddecf
-
Filesize
1.4MB
MD5ee08d4511e64262aaaa9f42125cfb9ff
SHA151224ea6e0a34be9cb64bbe11c679c64c3ff2f45
SHA2561aa8265c2092e98f7c0c20da477a3f102d918adebd53ff81916e3075670aba37
SHA512c2d67803e834a0f8279f7824bb4c1fdda010582f018200695c274837899aa0e74ce35aaa6a040c2d4dacaa6d6efe50f1ffe52a241a776a659561347b3a1f1edd
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD58a8e2908ac7cce20609f21abc1d15a2b
SHA1d0a29c1a24501be61ae11894fb9adc44847febc9
SHA2562540692bdeef33f141ee7185d2359ac3733b56d923c14d02ec63f5466990dc6a
SHA51235c65ddcc71c6f558690e8bc17120a09fd40d77bea9bfb54a79f4cc88704ebf407be4c64ebc8c68d7eef10c7bd7bb11025af78369b9b8829ee7673742ead6326
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641