Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 08:01
Static task
static1
Behavioral task
behavioral1
Sample
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe
Resource
win7-20240903-en
General
-
Target
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe
-
Size
13.7MB
-
MD5
08c3de089c96b058b4a27a1604389e9e
-
SHA1
561a7dc77c3be91f472ec17fc6f85c33ad084c31
-
SHA256
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480
-
SHA512
83fc0a319f05aa28255fcdb9aadb5b1967a7b8b4d735053ee4c2317721d7e4fc963a0cf131bf5b2c4c793224a774af76a7ca6f1d628abdb303a78dfb6a2107b5
-
SSDEEP
393216:S7B5lJw4/UFtJkQnBvZkWvhg3JFwN/0rc:uBjWwUFntZZvhg3JC/Yc
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2744-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2744-11-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2744-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2796-31-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2796-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2652-41-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2652-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2652-64-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2744-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2744-11-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2744-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2796-31-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2796-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2652-41-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2652-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2652-64-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 5 IoCs
Processes:
RVN.exeHD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeTXPlatforn.exeTXPlatforn.exemain.exepid Process 2744 RVN.exe 2624 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 2796 TXPlatforn.exe 2652 TXPlatforn.exe 1680 main.exe -
Loads dropped DLL 6 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeTXPlatforn.exeHD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exemain.exepid Process 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 2612 2796 TXPlatforn.exe 2624 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 1680 main.exe -
Drops file in System32 directory 2 IoCs
Processes:
RVN.exedescription ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Processes:
resource yara_rule behavioral1/memory/2744-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2744-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2744-11-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2744-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2796-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2796-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2652-41-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2652-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2652-64-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeRVN.exeTXPlatforn.execmd.exePING.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 2600 cmd.exe 1888 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exepid Process 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid Process 2652 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RVN.exeTXPlatforn.exedescription pid Process Token: SeIncBasePriorityPrivilege 2744 RVN.exe Token: SeLoadDriverPrivilege 2652 TXPlatforn.exe Token: 33 2652 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2652 TXPlatforn.exe Token: 33 2652 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2652 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exepid Process 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeRVN.exeTXPlatforn.execmd.exeHD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exedescription pid Process procid_target PID 2848 wrote to memory of 2744 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2848 wrote to memory of 2744 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2848 wrote to memory of 2744 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2848 wrote to memory of 2744 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2848 wrote to memory of 2744 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2848 wrote to memory of 2744 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2848 wrote to memory of 2744 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2848 wrote to memory of 2624 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 31 PID 2848 wrote to memory of 2624 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 31 PID 2848 wrote to memory of 2624 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 31 PID 2848 wrote to memory of 2624 2848 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 31 PID 2744 wrote to memory of 2600 2744 RVN.exe 34 PID 2744 wrote to memory of 2600 2744 RVN.exe 34 PID 2744 wrote to memory of 2600 2744 RVN.exe 34 PID 2744 wrote to memory of 2600 2744 RVN.exe 34 PID 2796 wrote to memory of 2652 2796 TXPlatforn.exe 36 PID 2796 wrote to memory of 2652 2796 TXPlatforn.exe 36 PID 2796 wrote to memory of 2652 2796 TXPlatforn.exe 36 PID 2796 wrote to memory of 2652 2796 TXPlatforn.exe 36 PID 2796 wrote to memory of 2652 2796 TXPlatforn.exe 36 PID 2796 wrote to memory of 2652 2796 TXPlatforn.exe 36 PID 2796 wrote to memory of 2652 2796 TXPlatforn.exe 36 PID 2600 wrote to memory of 1888 2600 cmd.exe 37 PID 2600 wrote to memory of 1888 2600 cmd.exe 37 PID 2600 wrote to memory of 1888 2600 cmd.exe 37 PID 2600 wrote to memory of 1888 2600 cmd.exe 37 PID 2624 wrote to memory of 1680 2624 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 38 PID 2624 wrote to memory of 1680 2624 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 38 PID 2624 wrote to memory of 1680 2624 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe"C:\Users\Admin\AppData\Local\Temp\012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeC:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\onefile_2624_133772545176770000\main.exeC:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.4MB
MD552b9120d93d4a341c663144b07313d4d
SHA1a33006a2b2e9c4714b030f2aef8e5ca51bd7422b
SHA25644615bbdb677c2e7f7637fb7bcdadd750ebda5cde160007896a0d7e57294e80f
SHA512f2ce70930559a3732b5ce1bbd0abd0b051308d319f87c5564a423e1fa24e2331e7201ebbd7604c3787b342414be7e9ea08c95b920846f4cd9c6fdfaaef855dd2
-
Filesize
5.5MB
MD5387bb2c1e40bde1517f06b46313766be
SHA1601f83ef61c7699652dec17edd5a45d6c20786c4
SHA2560817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad
-
Filesize
997KB
MD5d15461f50de1cddc7e44d50d8b582a00
SHA10e47ede740c7361a6adc0a3a0417702eaf96c821
SHA256b312b8d0163014c3312b88a2719683b8c12bcde4707a9f341ae0e16319f55486
SHA5120cc160fb43378c28797d9a2572945fdb7f7aa003bdabe8b6dd1e86a0ad7cfaa66b5eebd3305f9d8962898c2f4aa440e5aaafcf948464e11a9dc8dacf3f1a8a80
-
\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe
Filesize13.0MB
MD5e0942fdbdc1192816a84cadefe807f71
SHA17c9d36c98c7130cff3e9969bfbc380bfec193662
SHA256a14fc5e9ba72a4be06f6d16b3f1dc2a07f83fff13f14fb5bac95b6cac6c0e095
SHA5128e5cdb8f527e51dec180722e91c5f965418c690888998cf1f001426559eba9697c9ced8ed090740cf23018714c163c787745d0d9dc386da87d17b39900b6f827
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4