Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 10:09
Behavioral task
behavioral1
Sample
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe
Resource
win7-20240903-en
General
-
Target
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe
-
Size
11.4MB
-
MD5
6f6bb833a8191f08decacba9730e6d7d
-
SHA1
0597752575d4f9b9d71f5951506f6a0a6b4645e7
-
SHA256
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e
-
SHA512
7e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6
-
SSDEEP
196608:tpbyXKAoNI2BF/f6BVGTgxVG8VGb3bvGenj01x5DkQ9L/5fgnpjEDIbRp8g6bCzy:+XKAmNeBCbQ9LRsZ/8g6bCzoPAc+Qpce
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/files/0x000a000000023c0f-2.dat purplefox_rootkit -
Purplefox family
-
Executes dropped EXE 2 IoCs
Processes:
Mfiqc.exeMfiqc.exepid Process 4556 Mfiqc.exe 4608 Mfiqc.exe -
Drops file in System32 directory 2 IoCs
Processes:
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\Mfiqc.exe 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe File created C:\Windows\SysWOW64\Mfiqc.exe 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exeMfiqc.exeMfiqc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfiqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfiqc.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
Mfiqc.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Mfiqc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exeMfiqc.exedescription pid Process Token: SeSecurityPrivilege 508 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe Token: 33 4608 Mfiqc.exe Token: SeIncBasePriorityPrivilege 4608 Mfiqc.exe Token: 33 4608 Mfiqc.exe Token: SeIncBasePriorityPrivilege 4608 Mfiqc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Mfiqc.exedescription pid Process procid_target PID 4556 wrote to memory of 4608 4556 Mfiqc.exe 87 PID 4556 wrote to memory of 4608 4556 Mfiqc.exe 87 PID 4556 wrote to memory of 4608 4556 Mfiqc.exe 87 -
System policy modification 1 TTPs 2 IoCs
Processes:
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "3" 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe"C:\Users\Admin\AppData\Local\Temp\428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:508
-
C:\Windows\SysWOW64\Mfiqc.exeC:\Windows\SysWOW64\Mfiqc.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\Mfiqc.exeC:\Windows\SysWOW64\Mfiqc.exe -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD56f6bb833a8191f08decacba9730e6d7d
SHA10597752575d4f9b9d71f5951506f6a0a6b4645e7
SHA256428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e
SHA5127e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6