Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 08:06
Static task
static1
Behavioral task
behavioral1
Sample
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe
Resource
win7-20240903-en
General
-
Target
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe
-
Size
13.7MB
-
MD5
08c3de089c96b058b4a27a1604389e9e
-
SHA1
561a7dc77c3be91f472ec17fc6f85c33ad084c31
-
SHA256
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480
-
SHA512
83fc0a319f05aa28255fcdb9aadb5b1967a7b8b4d735053ee4c2317721d7e4fc963a0cf131bf5b2c4c793224a774af76a7ca6f1d628abdb303a78dfb6a2107b5
-
SSDEEP
393216:S7B5lJw4/UFtJkQnBvZkWvhg3JFwN/0rc:uBjWwUFntZZvhg3JC/Yc
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2688-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2688-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2996-27-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2688-49-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2996-53-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2640-55-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2640-61-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2640-78-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/2688-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2688-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2996-27-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2688-49-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2996-53-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2640-55-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2640-61-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2640-78-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 5 IoCs
Processes:
RVN.exeHD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeTXPlatforn.exeTXPlatforn.exemain.exepid Process 2688 RVN.exe 2732 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 2996 TXPlatforn.exe 2640 TXPlatforn.exe 1264 main.exe -
Loads dropped DLL 6 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeTXPlatforn.exeHD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exemain.exepid Process 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 3000 2996 TXPlatforn.exe 2732 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 1264 main.exe -
Drops file in System32 directory 2 IoCs
Processes:
RVN.exedescription ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
Processes:
resource yara_rule behavioral1/memory/2688-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2688-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2688-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2996-27-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2688-49-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2996-53-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2640-55-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2640-61-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2640-78-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
TXPlatforn.execmd.exePING.EXE012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeRVN.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVN.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 2864 cmd.exe 2080 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exepid Process 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid Process 2640 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
RVN.exeTXPlatforn.exedescription pid Process Token: SeIncBasePriorityPrivilege 2688 RVN.exe Token: SeLoadDriverPrivilege 2640 TXPlatforn.exe Token: 33 2640 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2640 TXPlatforn.exe Token: 33 2640 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 2640 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exepid Process 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeRVN.exeTXPlatforn.execmd.exeHD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exedescription pid Process procid_target PID 2128 wrote to memory of 2688 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2128 wrote to memory of 2688 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2128 wrote to memory of 2688 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2128 wrote to memory of 2688 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2128 wrote to memory of 2688 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2128 wrote to memory of 2688 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2128 wrote to memory of 2688 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 30 PID 2128 wrote to memory of 2732 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 31 PID 2128 wrote to memory of 2732 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 31 PID 2128 wrote to memory of 2732 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 31 PID 2128 wrote to memory of 2732 2128 012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 31 PID 2688 wrote to memory of 2864 2688 RVN.exe 34 PID 2688 wrote to memory of 2864 2688 RVN.exe 34 PID 2688 wrote to memory of 2864 2688 RVN.exe 34 PID 2688 wrote to memory of 2864 2688 RVN.exe 34 PID 2996 wrote to memory of 2640 2996 TXPlatforn.exe 36 PID 2996 wrote to memory of 2640 2996 TXPlatforn.exe 36 PID 2996 wrote to memory of 2640 2996 TXPlatforn.exe 36 PID 2996 wrote to memory of 2640 2996 TXPlatforn.exe 36 PID 2996 wrote to memory of 2640 2996 TXPlatforn.exe 36 PID 2996 wrote to memory of 2640 2996 TXPlatforn.exe 36 PID 2996 wrote to memory of 2640 2996 TXPlatforn.exe 36 PID 2864 wrote to memory of 2080 2864 cmd.exe 37 PID 2864 wrote to memory of 2080 2864 cmd.exe 37 PID 2864 wrote to memory of 2080 2864 cmd.exe 37 PID 2864 wrote to memory of 2080 2864 cmd.exe 37 PID 2732 wrote to memory of 1264 2732 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 38 PID 2732 wrote to memory of 1264 2732 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 38 PID 2732 wrote to memory of 1264 2732 HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe"C:\Users\Admin\AppData\Local\Temp\012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exeC:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\onefile_2732_133772547892110000\main.exeC:\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1264
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756KB
MD5d399445b035b99c4de849127250658d0
SHA141c15a5f765b7c9df4cdc89c42e105ee71284bf4
SHA256b1b8e5f4c7dbddbb74e19d6dabdf093610e82b0eca11a07998ba7fe67b52378f
SHA51272574483a3984ba7a6fcabfe8331b54b9a5f500cc625bf098507101afef8631611ca9c1eb2baf577209ed926b87e2ed6d2403603fc0f7e55b5819a734ed6c23f
-
Filesize
24.4MB
MD552b9120d93d4a341c663144b07313d4d
SHA1a33006a2b2e9c4714b030f2aef8e5ca51bd7422b
SHA25644615bbdb677c2e7f7637fb7bcdadd750ebda5cde160007896a0d7e57294e80f
SHA512f2ce70930559a3732b5ce1bbd0abd0b051308d319f87c5564a423e1fa24e2331e7201ebbd7604c3787b342414be7e9ea08c95b920846f4cd9c6fdfaaef855dd2
-
Filesize
5.5MB
MD5387bb2c1e40bde1517f06b46313766be
SHA1601f83ef61c7699652dec17edd5a45d6c20786c4
SHA2560817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad
-
\Users\Admin\AppData\Local\Temp\HD_012553f207c6bb19d5fc09ac7cc6cd3ed43e30a5c8374ba8f662d5247ca74480.exe
Filesize13.0MB
MD5e0942fdbdc1192816a84cadefe807f71
SHA17c9d36c98c7130cff3e9969bfbc380bfec193662
SHA256a14fc5e9ba72a4be06f6d16b3f1dc2a07f83fff13f14fb5bac95b6cac6c0e095
SHA5128e5cdb8f527e51dec180722e91c5f965418c690888998cf1f001426559eba9697c9ced8ed090740cf23018714c163c787745d0d9dc386da87d17b39900b6f827
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4