Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 07:24
Behavioral task
behavioral1
Sample
2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe
Resource
win7-20240729-en
General
-
Target
2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe
-
Size
11.4MB
-
MD5
6f6bb833a8191f08decacba9730e6d7d
-
SHA1
0597752575d4f9b9d71f5951506f6a0a6b4645e7
-
SHA256
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e
-
SHA512
7e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6
-
SSDEEP
196608:tpbyXKAoNI2BF/f6BVGTgxVG8VGb3bvGenj01x5DkQ9L/5fgnpjEDIbRp8g6bCzy:+XKAmNeBCbQ9LRsZ/8g6bCzoPAc+Qpce
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x000c000000023b30-2.dat purplefox_rootkit -
Purplefox family
-
Executes dropped EXE 2 IoCs
pid Process 456 Mfiqc.exe 1972 Mfiqc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mfiqc.exe 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe File opened for modification C:\Windows\SysWOW64\Mfiqc.exe 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfiqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfiqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Mfiqc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Mfiqc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Mfiqc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeSecurityPrivilege 2000 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe Token: 33 1972 Mfiqc.exe Token: SeIncBasePriorityPrivilege 1972 Mfiqc.exe Token: 33 1972 Mfiqc.exe Token: SeIncBasePriorityPrivilege 1972 Mfiqc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 1972 456 Mfiqc.exe 87 PID 456 wrote to memory of 1972 456 Mfiqc.exe 87 PID 456 wrote to memory of 1972 456 Mfiqc.exe 87 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "3" 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2000
-
C:\Windows\SysWOW64\Mfiqc.exeC:\Windows\SysWOW64\Mfiqc.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\Mfiqc.exeC:\Windows\SysWOW64\Mfiqc.exe -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.4MB
MD56f6bb833a8191f08decacba9730e6d7d
SHA10597752575d4f9b9d71f5951506f6a0a6b4645e7
SHA256428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e
SHA5127e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6