Analysis
-
max time kernel
77s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 03:49
Static task
static1
Behavioral task
behavioral1
Sample
SoftUpdate.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SoftUpdate.exe
Resource
win10v2004-20241007-en
General
-
Target
SoftUpdate.exe
-
Size
27.3MB
-
MD5
7242a7175a802d9d42020d49d302c8ca
-
SHA1
ff0f6adcce3d43a3aca6dc07bd58a4d8a981db7a
-
SHA256
5d58b6a597af3f62350210bf7787ae6f95dfe339f78f4cd73532d58e437fee31
-
SHA512
32277c1711aeec60349f4b2987c6fefe6059d40ad04abdc6f49c71cf89d59fdfcd1da5b4a59dfe47bbb15541fcf6a008ba5ce20689d5570a1c967d51c99d04c5
-
SSDEEP
393216:AbpnKq10jUmMdJKOQIWx0XsiK5isSG90AQ/WF80uVgV3bo01gZeFIqCnzieQb1tk:op0gJKObG9zpQ0rhV3bb1xFI7xQb1tM1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2816-17406-0x0000000000400000-0x0000000001F59000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2816-17406-0x0000000000400000-0x0000000001F59000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Deletes itself 1 IoCs
pid Process 3868 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 9488 Kbskb.exe 6304 Kbskb.exe -
Loads dropped DLL 1 IoCs
pid Process 9488 Kbskb.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kbskb.exe SoftUpdate.exe File opened for modification C:\Windows\SysWOW64\Kbskb.exe SoftUpdate.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 2816 SoftUpdate.exe 2816 SoftUpdate.exe 2816 SoftUpdate.exe 2816 SoftUpdate.exe 2816 SoftUpdate.exe 2816 SoftUpdate.exe 2816 SoftUpdate.exe 9488 Kbskb.exe 2816 SoftUpdate.exe 9488 Kbskb.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SoftUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbskb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbskb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3868 cmd.exe 8312 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 8312 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2816 SoftUpdate.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3868 2816 SoftUpdate.exe 31 PID 2816 wrote to memory of 3868 2816 SoftUpdate.exe 31 PID 2816 wrote to memory of 3868 2816 SoftUpdate.exe 31 PID 2816 wrote to memory of 3868 2816 SoftUpdate.exe 31 PID 2816 wrote to memory of 3868 2816 SoftUpdate.exe 31 PID 2816 wrote to memory of 3868 2816 SoftUpdate.exe 31 PID 2816 wrote to memory of 3868 2816 SoftUpdate.exe 31 PID 9488 wrote to memory of 6304 9488 Kbskb.exe 32 PID 9488 wrote to memory of 6304 9488 Kbskb.exe 32 PID 9488 wrote to memory of 6304 9488 Kbskb.exe 32 PID 9488 wrote to memory of 6304 9488 Kbskb.exe 32 PID 3868 wrote to memory of 8312 3868 cmd.exe 34 PID 3868 wrote to memory of 8312 3868 cmd.exe 34 PID 3868 wrote to memory of 8312 3868 cmd.exe 34 PID 3868 wrote to memory of 8312 3868 cmd.exe 34 PID 3868 wrote to memory of 8312 3868 cmd.exe 34 PID 3868 wrote to memory of 8312 3868 cmd.exe 34 PID 3868 wrote to memory of 8312 3868 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\SoftUpdate.exe"C:\Users\Admin\AppData\Local\Temp\SoftUpdate.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\SOFTUP~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:8312
-
-
-
C:\Windows\SysWOW64\Kbskb.exeC:\Windows\SysWOW64\Kbskb.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:9488 -
C:\Windows\SysWOW64\Kbskb.exeC:\Windows\SysWOW64\Kbskb.exe -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27.3MB
MD57242a7175a802d9d42020d49d302c8ca
SHA1ff0f6adcce3d43a3aca6dc07bd58a4d8a981db7a
SHA2565d58b6a597af3f62350210bf7787ae6f95dfe339f78f4cd73532d58e437fee31
SHA51232277c1711aeec60349f4b2987c6fefe6059d40ad04abdc6f49c71cf89d59fdfcd1da5b4a59dfe47bbb15541fcf6a008ba5ce20689d5570a1c967d51c99d04c5