Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe
Resource
win7-20240903-en
General
-
Target
bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe
-
Size
2.9MB
-
MD5
fe86e62f1f8cc2b9160c316c7e1ccffd
-
SHA1
540ed568fad46b2e4bccd6460e98e7e07a78068f
-
SHA256
bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af
-
SHA512
1cbe0eba13af47bfa1781d766dfaab6a0a185afa8f48694b5aab25c20a557101b69b63977a04c4cef0f9b5fde66deaea888e459f755fdee99c061e63f7eeb48a
-
SSDEEP
49152:Mh2n9VNAIW4k4W6fskkkF+SHU932E0DIR:Msn9Vhek2rv0DIR
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/11808-21919-0x0000000010000000-0x00000000101B5000-memory.dmp purplefox_rootkit behavioral2/memory/11808-21918-0x0000000010000000-0x00000000101B5000-memory.dmp purplefox_rootkit behavioral2/memory/11404-29924-0x0000000010000000-0x00000000101B5000-memory.dmp purplefox_rootkit behavioral2/memory/11404-31253-0x0000000010000000-0x00000000101B5000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/11808-21919-0x0000000010000000-0x00000000101B5000-memory.dmp family_gh0strat behavioral2/memory/11808-21918-0x0000000010000000-0x00000000101B5000-memory.dmp family_gh0strat behavioral2/memory/11404-29924-0x0000000010000000-0x00000000101B5000-memory.dmp family_gh0strat behavioral2/memory/11404-31253-0x0000000010000000-0x00000000101B5000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
Processes:
Serveri.dlldescription ioc Process File created C:\Windows\system32\drivers\QAssist.sys Serveri.dll -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
Serveri.dlldescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" Serveri.dll -
Drops startup file 1 IoCs
Processes:
bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe.lnk bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe -
Executes dropped EXE 4 IoCs
Processes:
Serveri.dllServeri.dllServeri.dllPhxph.exepid Process 3760 Serveri.dll 11808 Serveri.dll 11404 Serveri.dll 25492 Phxph.exe -
Drops file in System32 directory 5 IoCs
Processes:
bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exeServeri.dlldescription ioc Process File created C:\Windows\SysWOW64\Serveri.dll bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe File opened for modification C:\Windows\SysWOW64\Serveri.dll bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe File created C:\Windows\SysWOW64\Phxph.exe Serveri.dll File opened for modification C:\Windows\SysWOW64\Phxph.exe Serveri.dll File opened for modification C:\Windows\SysWOW64\Serveri.dll Serveri.dll -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
Processes:
Serveri.dllServeri.dllPhxph.exepid Process 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 25492 Phxph.exe 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11404 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11808 Serveri.dll 11404 Serveri.dll -
Processes:
resource yara_rule behavioral2/memory/11808-21919-0x0000000010000000-0x00000000101B5000-memory.dmp upx behavioral2/memory/11808-21918-0x0000000010000000-0x00000000101B5000-memory.dmp upx behavioral2/memory/11808-21916-0x0000000010000000-0x00000000101B5000-memory.dmp upx behavioral2/memory/11404-29924-0x0000000010000000-0x00000000101B5000-memory.dmp upx behavioral2/memory/11404-31253-0x0000000010000000-0x00000000101B5000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exeServeri.dllServeri.dllPhxph.exeServeri.dllcmd.exePING.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Serveri.dll Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Serveri.dll Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phxph.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Serveri.dll Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 10444 cmd.exe 10412 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
Serveri.dllpid Process 11404 Serveri.dll -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Serveri.dllServeri.dlldescription pid Process Token: SeLoadDriverPrivilege 11404 Serveri.dll Token: SeIncBasePriorityPrivilege 11808 Serveri.dll Token: 33 11404 Serveri.dll Token: SeIncBasePriorityPrivilege 11404 Serveri.dll Token: 33 11404 Serveri.dll Token: SeIncBasePriorityPrivilege 11404 Serveri.dll -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exepid Process 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exeServeri.dllcmd.exedescription pid Process procid_target PID 2188 wrote to memory of 3760 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 85 PID 2188 wrote to memory of 3760 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 85 PID 2188 wrote to memory of 3760 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 85 PID 2188 wrote to memory of 11808 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 87 PID 2188 wrote to memory of 11808 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 87 PID 2188 wrote to memory of 11808 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 87 PID 2188 wrote to memory of 11404 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 89 PID 2188 wrote to memory of 11404 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 89 PID 2188 wrote to memory of 11404 2188 bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe 89 PID 11808 wrote to memory of 10444 11808 Serveri.dll 96 PID 11808 wrote to memory of 10444 11808 Serveri.dll 96 PID 11808 wrote to memory of 10444 11808 Serveri.dll 96 PID 10444 wrote to memory of 10412 10444 cmd.exe 98 PID 10444 wrote to memory of 10412 10444 cmd.exe 98 PID 10444 wrote to memory of 10412 10444 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe"C:\Users\Admin\AppData\Local\Temp\bac9522027f995192c65ef3695741d690c3d1e43c15db42f42e52f3018db64af.exe"1⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\Serveri.dllC:\Windows\system32\\Serveri.dll2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760
-
-
C:\Windows\SysWOW64\Serveri.dllC:\Windows\system32\\Serveri.dll2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:11808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Windows\SysWOW64\Serveri.dll > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:10444 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:10412
-
-
-
-
C:\Windows\SysWOW64\Serveri.dllC:\Windows\system32\\Serveri.dll2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:11404
-
-
C:\Windows\SysWOW64\Phxph.exeC:\Windows\SysWOW64\Phxph.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:25492
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22.1MB
MD544d1ce29474bad8ada3d778af1dac0f3
SHA1319f966cc44529a564f9d5d19e0fb99e0af2ea19
SHA256d75217eccc9e4b9a2ccfb2819b1fdbf01a074042292bcf3162ec27a01b7ee1cf
SHA512511ac3bfa10928190c7cb035a976c673fb758950ce4accde4a80b81b62ee0585d5d51930571ffa177fb1d63ecd4a770415bc09800cc5cd1ac6cb7efa16b7d025
-
Filesize
1.1MB
MD51144ea1e19cb2a42f7ad2fa04db8e476
SHA12ef6e0f9c5e57305bff6d30080cf68c1d3e101d9
SHA25620569e9045f5c150eafa51752334b62c78b9dbc308d61dacfcb2098a76c5cf50
SHA5123df308eafc0f014a07fbdeb706b32eb5de7e02a7496e70e5035d9b76db239435a2511964fc027380aad19763755c4e07e52f4e157b691c55c5a03d5b21593556