Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 17:32

General

  • Target

    002654万润科技xlsx.exe

  • Size

    224KB

  • MD5

    2bdffc0196fa8fe420d450c30d3e47f9

  • SHA1

    6751e2f6afae3c6dee6ebe82630d19e19ac7b3af

  • SHA256

    1497ef3f6249427ac349bf5178e21d9d63aacfab84327e97bfdc4149f775b9bb

  • SHA512

    cee9ef8d61f67273cd4a787754d78bbe655afa6064f3dccd9b08283a293524df98c56d2efd9c647c14f3a8c35b21971c9d51b7ede12b2617d0afd3db2d75f2b4

  • SSDEEP

    3072:NJJcpg42DhdTpmrestbnZqKFUdIAP6WokM7UbGVXTYJVJhhCVh3VoCoz7pHkQ:NQpgl1dTpgeoFYBLojUbGVOSVO7F

Malware Config

Signatures

  • Detect PurpleFox Rootkit 1 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Purplefox family
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\002654万润科技xlsx.exe
    "C:\Users\Admin\AppData\Local\Temp\002654万润科技xlsx.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Public\Windows\RuntimeBroker.exe
      "C:\Users\Public\Windows\RuntimeBroker.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Windows\RuntimeBroker.exe

    Filesize

    625KB

    MD5

    dec397e36e9f5e8a47040adbbf04e20b

    SHA1

    643f2b5b37723ebc493ba6993514a4b2d9171acb

    SHA256

    534fd2d6da5c361831eb7fbfd1b203fbb80cd363d33f69abc4eafc384bafdc5e

    SHA512

    b2cdd06c044ae8b4cf7ae5c32b65f2b03f733b93061b9076cf29103da53573460c7e5d53da72220055cdafb084c63019d4a134d562a06af81c1eaad30892845b

  • C:\Users\Public\Windows\UnityPlayer.dll

    Filesize

    1.6MB

    MD5

    e88fc0397333b68de30196ff07c2a704

    SHA1

    d8ff5a6a136d68932d28c52fa36058808a7ac69c

    SHA256

    06d4ea89ca038f6b476a04aa264ea12c3e92a0241161a56cbf2090b4fef2a30e

    SHA512

    c613ef286c0742515e0af74c1092a2ba8e93495fe5e6947f9faa3441db3052448c453e23528edc20cae900b7b90c9934d6ed8ee5cb036b6a6eddd6000aa3d35d

  • memory/3488-15-0x0000000077761000-0x0000000077881000-memory.dmp

    Filesize

    1.1MB

  • memory/3488-16-0x0000000010000000-0x00000000101A4000-memory.dmp

    Filesize

    1.6MB