Analysis Overview
SHA256
428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e
Threat Level: Known bad
The file 2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz was found to be: Known bad.
Malicious Activity Summary
Purplefox family
PurpleFox
Detect PurpleFox Rootkit
Loads dropped DLL
Executes dropped EXE
Drops file in System32 directory
System Location Discovery: System Language Discovery
Unsigned PE
System policy modification
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-08 07:24
Signatures
Detect PurpleFox Rootkit
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Purplefox family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-08 07:24
Reported
2024-11-08 07:27
Platform
win7-20240729-en
Max time kernel
147s
Max time network
119s
Command Line
Signatures
Detect PurpleFox Rootkit
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
PurpleFox
Purplefox family
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\Mfiqc.exe | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\Mfiqc.exe | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b2-d5-76-d1-c9\WpadDecision = "0" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080} | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\WpadDecisionReason = "1" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b2-d5-76-d1-c9\WpadDecisionReason = "1" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b2-d5-76-d1-c9\WpadDecisionTime = c0d8724aaf31db01 | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\WpadDecisionTime = c0d8724aaf31db01 | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0127000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0a-b2-d5-76-d1-c9 | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\0a-b2-d5-76-d1-c9 | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\WpadNetworkName = "Network 3" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (data) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (str) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7443692-E514-43B5-B715-15866F785080}\WpadDecision = "0" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeSecurityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1700 wrote to memory of 2392 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | C:\Windows\SysWOW64\Mfiqc.exe |
| PID 1700 wrote to memory of 2392 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | C:\Windows\SysWOW64\Mfiqc.exe |
| PID 1700 wrote to memory of 2392 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | C:\Windows\SysWOW64\Mfiqc.exe |
| PID 1700 wrote to memory of 2392 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | C:\Windows\SysWOW64\Mfiqc.exe |
System policy modification
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "3" | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe
"C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe"
C:\Windows\SysWOW64\Mfiqc.exe
C:\Windows\SysWOW64\Mfiqc.exe -auto
C:\Windows\SysWOW64\Mfiqc.exe
C:\Windows\SysWOW64\Mfiqc.exe -acsi
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | qifu-api.baidubce.com | udp |
| CN | 182.61.62.106:443 | qifu-api.baidubce.com | tcp |
| CN | 182.61.200.153:443 | qifu-api.baidubce.com | tcp |
| CN | 112.34.112.38:443 | qifu-api.baidubce.com | tcp |
| US | 8.8.8.8:53 | myip.ipip.net | udp |
| US | 104.22.31.153:80 | myip.ipip.net | tcp |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp |
Files
C:\Windows\SysWOW64\Mfiqc.exe
| MD5 | 6f6bb833a8191f08decacba9730e6d7d |
| SHA1 | 0597752575d4f9b9d71f5951506f6a0a6b4645e7 |
| SHA256 | 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e |
| SHA512 | 7e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-08 07:24
Reported
2024-11-08 07:27
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
150s
Command Line
Signatures
Detect PurpleFox Rootkit
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
PurpleFox
Purplefox family
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\Mfiqc.exe | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\Mfiqc.exe | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Key created | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Set value (int) | \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeSecurityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Token: 33 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\SysWOW64\Mfiqc.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 456 wrote to memory of 1972 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | C:\Windows\SysWOW64\Mfiqc.exe |
| PID 456 wrote to memory of 1972 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | C:\Windows\SysWOW64\Mfiqc.exe |
| PID 456 wrote to memory of 1972 | N/A | C:\Windows\SysWOW64\Mfiqc.exe | C:\Windows\SysWOW64\Mfiqc.exe |
System policy modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "3" | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System | C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe
"C:\Users\Admin\AppData\Local\Temp\2024-11-08_6f6bb833a8191f08decacba9730e6d7d_avoslocker_luca-stealer_mimikatz.exe"
C:\Windows\SysWOW64\Mfiqc.exe
C:\Windows\SysWOW64\Mfiqc.exe -auto
C:\Windows\SysWOW64\Mfiqc.exe
C:\Windows\SysWOW64\Mfiqc.exe -acsi
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | qifu-api.baidubce.com | udp |
| CN | 110.242.68.112:443 | qifu-api.baidubce.com | tcp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| CN | 124.237.176.106:443 | qifu-api.baidubce.com | tcp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.117.19.2.in-addr.arpa | udp |
| CN | 182.61.200.153:443 | qifu-api.baidubce.com | tcp |
| US | 8.8.8.8:53 | myip.ipip.net | udp |
| US | 104.22.30.153:80 | myip.ipip.net | tcp |
| US | 8.8.8.8:53 | 153.30.22.104.in-addr.arpa | udp |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp | |
| N/A | 127.0.0.1:18926 | tcp |
Files
C:\Windows\SysWOW64\Mfiqc.exe
| MD5 | 6f6bb833a8191f08decacba9730e6d7d |
| SHA1 | 0597752575d4f9b9d71f5951506f6a0a6b4645e7 |
| SHA256 | 428792c0a53e4218e0ad0c79b9e3040637977ae118b60aeb6ee1d9a45bb33a3e |
| SHA512 | 7e143310c40100b1ce85504e755a8686d5a5345e03fae4f28e618102ac2e852edee0e004524204cdbb1d3f0a6b411a4c7c037cb7bb8f5111a68ac4ca945013b6 |