Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe
Resource
win7-20240903-en
General
-
Target
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe
-
Size
491KB
-
MD5
d4a3ce48cefcad6ef68222189195adb5
-
SHA1
fba76b5c3190e8cca9ce9c42620195fe9ba0e30d
-
SHA256
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683
-
SHA512
e3fd2fc09dc3f33bfb4f1a76010b4fc79d880acd6ca701a2d10f4fe36f4289450f49b78bb012ddc9331772207b5c759192396811e4e3b3ffb61e2a4c72caedb7
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2Re6lZv:oDR+u8pfjYMMWNvdhUSByFPzAv
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1800-2-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/1800-3-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/1800-5-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/1800-6-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/1800-4-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2544-16-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2544-14-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2544-26-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2528-27-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral1/memory/2528-24-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral1/memory/1800-2-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/1800-3-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/1800-5-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/1800-6-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/1800-4-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2544-16-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2544-14-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2544-26-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2528-27-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral1/memory/2528-24-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Deletes itself 1 IoCs
pid Process 2064 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2544 Deuvw.exe 2528 Deuvw.exe -
Loads dropped DLL 1 IoCs
pid Process 2544 Deuvw.exe -
resource yara_rule behavioral1/memory/1800-2-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/1800-0-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/1800-3-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/1800-5-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/1800-6-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/1800-4-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2544-16-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2544-14-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2544-26-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2528-27-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral1/memory/2528-24-0x0000000010000000-0x00000000101D0000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Deuvw.exe 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe File opened for modification C:\Program Files\Deuvw.exe 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deuvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deuvw.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2064 cmd.exe 2768 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2768 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1800 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2064 1800 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 31 PID 1800 wrote to memory of 2064 1800 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 31 PID 1800 wrote to memory of 2064 1800 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 31 PID 1800 wrote to memory of 2064 1800 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 31 PID 2544 wrote to memory of 2528 2544 Deuvw.exe 32 PID 2544 wrote to memory of 2528 2544 Deuvw.exe 32 PID 2544 wrote to memory of 2528 2544 Deuvw.exe 32 PID 2544 wrote to memory of 2528 2544 Deuvw.exe 32 PID 2064 wrote to memory of 2768 2064 cmd.exe 34 PID 2064 wrote to memory of 2768 2064 cmd.exe 34 PID 2064 wrote to memory of 2768 2064 cmd.exe 34 PID 2064 wrote to memory of 2768 2064 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe"C:\Users\Admin\AppData\Local\Temp\7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\7D6057~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2768
-
-
-
C:\Program Files\Deuvw.exe"C:\\Program Files\\Deuvw.exe" -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files\Deuvw.exe"C:\Program Files\Deuvw.exe" -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD5d4a3ce48cefcad6ef68222189195adb5
SHA1fba76b5c3190e8cca9ce9c42620195fe9ba0e30d
SHA2567d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683
SHA512e3fd2fc09dc3f33bfb4f1a76010b4fc79d880acd6ca701a2d10f4fe36f4289450f49b78bb012ddc9331772207b5c759192396811e4e3b3ffb61e2a4c72caedb7