Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 03:54
Static task
static1
Behavioral task
behavioral1
Sample
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe
Resource
win7-20240903-en
General
-
Target
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe
-
Size
491KB
-
MD5
d4a3ce48cefcad6ef68222189195adb5
-
SHA1
fba76b5c3190e8cca9ce9c42620195fe9ba0e30d
-
SHA256
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683
-
SHA512
e3fd2fc09dc3f33bfb4f1a76010b4fc79d880acd6ca701a2d10f4fe36f4289450f49b78bb012ddc9331772207b5c759192396811e4e3b3ffb61e2a4c72caedb7
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2Re6lZv:oDR+u8pfjYMMWNvdhUSByFPzAv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3660-3-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3660-5-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3660-2-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/1620-17-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/1620-16-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/1620-14-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/1620-19-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3660-20-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/1620-13-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3044-24-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3044-23-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3044-27-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3044-26-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 13 IoCs
resource yara_rule behavioral2/memory/3660-3-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3660-5-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3660-2-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/1620-17-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/1620-16-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/1620-14-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/1620-19-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3660-20-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/1620-13-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3044-24-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3044-23-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3044-27-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3044-26-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Executes dropped EXE 2 IoCs
pid Process 1620 Deuvw.exe 3044 Deuvw.exe -
resource yara_rule behavioral2/memory/3660-0-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3660-3-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3660-5-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3660-2-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1620-17-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1620-16-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1620-14-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1620-19-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3660-20-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1620-13-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1620-11-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3044-24-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3044-23-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3044-27-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3044-26-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3044-21-0x0000000010000000-0x00000000101D0000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Deuvw.exe 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe File opened for modification C:\Program Files\Deuvw.exe 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deuvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deuvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1716 cmd.exe 4376 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4376 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3660 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3044 1620 Deuvw.exe 84 PID 1620 wrote to memory of 3044 1620 Deuvw.exe 84 PID 1620 wrote to memory of 3044 1620 Deuvw.exe 84 PID 3660 wrote to memory of 1716 3660 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 85 PID 3660 wrote to memory of 1716 3660 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 85 PID 3660 wrote to memory of 1716 3660 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 85 PID 1716 wrote to memory of 4376 1716 cmd.exe 87 PID 1716 wrote to memory of 4376 1716 cmd.exe 87 PID 1716 wrote to memory of 4376 1716 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe"C:\Users\Admin\AppData\Local\Temp\7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\7D6057~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4376
-
-
-
C:\Program Files\Deuvw.exe"C:\\Program Files\\Deuvw.exe" -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files\Deuvw.exe"C:\Program Files\Deuvw.exe" -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD5d4a3ce48cefcad6ef68222189195adb5
SHA1fba76b5c3190e8cca9ce9c42620195fe9ba0e30d
SHA2567d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683
SHA512e3fd2fc09dc3f33bfb4f1a76010b4fc79d880acd6ca701a2d10f4fe36f4289450f49b78bb012ddc9331772207b5c759192396811e4e3b3ffb61e2a4c72caedb7