Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 07:24
Behavioral task
behavioral1
Sample
2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe
Resource
win7-20240729-en
General
-
Target
2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe
-
Size
11.4MB
-
MD5
6f6bb833a8191f08decacba9730e6d7d
-
SHA1
0597752575d4f9b9d71f5951506f6a0a6b4645e7
-
SHA256
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e
-
SHA512
7e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6
-
SSDEEP
196608:tpbyXKAoNI2BF/f6BVGTgxVG8VGb3bvGenj01x5DkQ9L/5fgnpjEDIbRp8g6bCzy:+XKAmNeBCbQ9LRsZ/8g6bCzoPAc+Qpce
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000c00000001226d-2.dat purplefox_rootkit -
Purplefox family
-
Executes dropped EXE 2 IoCs
pid Process 1700 Mfiqc.exe 2392 Mfiqc.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 Mfiqc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mfiqc.exe 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe File opened for modification C:\Windows\SysWOW64\Mfiqc.exe 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfiqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfiqc.exe -
Modifies data under HKEY_USERS 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b2-d5-76-d1-c9\WpadDecision = "0" Mfiqc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080} Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\WpadDecisionReason = "1" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b2-d5-76-d1-c9\WpadDecisionReason = "1" Mfiqc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b2-d5-76-d1-c9\WpadDecisionTime = c0d8724aaf31db01 Mfiqc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix Mfiqc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" Mfiqc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\WpadDecisionTime = c0d8724aaf31db01 Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad Mfiqc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0127000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b2-d5-76-d1-c9 Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\0a-b2-d5-76-d1-c9 Mfiqc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\WpadNetworkName = "Network 3" Mfiqc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" Mfiqc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\WpadDecision = "0" Mfiqc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeSecurityPrivilege 2112 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe Token: 33 2392 Mfiqc.exe Token: SeIncBasePriorityPrivilege 2392 Mfiqc.exe Token: 33 2392 Mfiqc.exe Token: SeIncBasePriorityPrivilege 2392 Mfiqc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2392 1700 Mfiqc.exe 31 PID 1700 wrote to memory of 2392 1700 Mfiqc.exe 31 PID 1700 wrote to memory of 2392 1700 Mfiqc.exe 31 PID 1700 wrote to memory of 2392 1700 Mfiqc.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "3" 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2112
-
C:\Windows\SysWOW64\Mfiqc.exeC:\Windows\SysWOW64\Mfiqc.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\Mfiqc.exeC:\Windows\SysWOW64\Mfiqc.exe -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD56f6bb833a8191f08decacba9730e6d7d
SHA10597752575d4f9b9d71f5951506f6a0a6b4645e7
SHA256428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e
SHA5127e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6