Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-11-2024 10:09
Behavioral task
behavioral1
Sample
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe
Resource
win7-20240903-en
General
-
Target
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe
-
Size
11.4MB
-
MD5
6f6bb833a8191f08decacba9730e6d7d
-
SHA1
0597752575d4f9b9d71f5951506f6a0a6b4645e7
-
SHA256
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e
-
SHA512
7e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6
-
SSDEEP
196608:tpbyXKAoNI2BF/f6BVGTgxVG8VGb3bvGenj01x5DkQ9L/5fgnpjEDIbRp8g6bCzy:+XKAmNeBCbQ9LRsZ/8g6bCzoPAc+Qpce
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/files/0x0007000000012117-2.dat purplefox_rootkit -
Purplefox family
-
Executes dropped EXE 2 IoCs
Processes:
Mfiqc.exeMfiqc.exepid Process 1664 Mfiqc.exe 2320 Mfiqc.exe -
Loads dropped DLL 1 IoCs
Processes:
Mfiqc.exepid Process 1664 Mfiqc.exe -
Drops file in System32 directory 2 IoCs
Processes:
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exedescription ioc Process File created C:\Windows\SysWOW64\Mfiqc.exe 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe File opened for modification C:\Windows\SysWOW64\Mfiqc.exe 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Mfiqc.exeMfiqc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfiqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfiqc.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
Mfiqc.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00bc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Mfiqc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Mfiqc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-19-4e-b4-0b-99\WpadDecisionTime = c0deca17fd30db01 Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-19-4e-b4-0b-99\WpadDecision = "0" Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-19-4e-b4-0b-99 Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Mfiqc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Mfiqc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7C600502-6452-49B1-BE41-03D454CA9454} Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7C600502-6452-49B1-BE41-03D454CA9454}\WpadDecisionReason = "1" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7C600502-6452-49B1-BE41-03D454CA9454}\WpadDecision = "0" Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7C600502-6452-49B1-BE41-03D454CA9454}\a6-19-4e-b4-0b-99 Mfiqc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Mfiqc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Mfiqc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7C600502-6452-49B1-BE41-03D454CA9454}\WpadDecisionTime = c0deca17fd30db01 Mfiqc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{7C600502-6452-49B1-BE41-03D454CA9454}\WpadNetworkName = "Network 3" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\a6-19-4e-b4-0b-99\WpadDecisionReason = "1" Mfiqc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exeMfiqc.exedescription pid Process Token: SeSecurityPrivilege 2404 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe Token: 33 2320 Mfiqc.exe Token: SeIncBasePriorityPrivilege 2320 Mfiqc.exe Token: 33 2320 Mfiqc.exe Token: SeIncBasePriorityPrivilege 2320 Mfiqc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Mfiqc.exedescription pid Process procid_target PID 1664 wrote to memory of 2320 1664 Mfiqc.exe 31 PID 1664 wrote to memory of 2320 1664 Mfiqc.exe 31 PID 1664 wrote to memory of 2320 1664 Mfiqc.exe 31 PID 1664 wrote to memory of 2320 1664 Mfiqc.exe 31 -
System policy modification 1 TTPs 2 IoCs
Processes:
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "3" 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe"C:\Users\Admin\AppData\Local\Temp\428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2404
-
C:\Windows\SysWOW64\Mfiqc.exeC:\Windows\SysWOW64\Mfiqc.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Mfiqc.exeC:\Windows\SysWOW64\Mfiqc.exe -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD56f6bb833a8191f08decacba9730e6d7d
SHA10597752575d4f9b9d71f5951506f6a0a6b4645e7
SHA256428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e
SHA5127e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6