Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe
Resource
win7-20240903-en
General
-
Target
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe
-
Size
491KB
-
MD5
d4a3ce48cefcad6ef68222189195adb5
-
SHA1
fba76b5c3190e8cca9ce9c42620195fe9ba0e30d
-
SHA256
7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683
-
SHA512
e3fd2fc09dc3f33bfb4f1a76010b4fc79d880acd6ca701a2d10f4fe36f4289450f49b78bb012ddc9331772207b5c759192396811e4e3b3ffb61e2a4c72caedb7
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2Re6lZv:oDR+u8pfjYMMWNvdhUSByFPzAv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1476-2-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/1476-5-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/1476-3-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/1476-6-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4068-13-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4068-14-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4068-16-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4068-17-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/1476-23-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3512-26-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4068-25-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3512-28-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 12 IoCs
resource yara_rule behavioral2/memory/1476-2-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/1476-5-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/1476-3-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/1476-6-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4068-13-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4068-14-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4068-16-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4068-17-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/1476-23-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3512-26-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4068-25-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3512-28-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Executes dropped EXE 2 IoCs
pid Process 4068 Deuvw.exe 3512 Deuvw.exe -
resource yara_rule behavioral2/memory/1476-2-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1476-0-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1476-5-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1476-3-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1476-6-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4068-13-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4068-14-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4068-16-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4068-11-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4068-17-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/1476-23-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3512-26-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4068-25-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3512-28-0x0000000010000000-0x00000000101D0000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Deuvw.exe 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe File opened for modification C:\Program Files\Deuvw.exe 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deuvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Deuvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2480 PING.EXE 3604 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2480 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1476 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4068 wrote to memory of 3512 4068 Deuvw.exe 84 PID 4068 wrote to memory of 3512 4068 Deuvw.exe 84 PID 4068 wrote to memory of 3512 4068 Deuvw.exe 84 PID 1476 wrote to memory of 3604 1476 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 85 PID 1476 wrote to memory of 3604 1476 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 85 PID 1476 wrote to memory of 3604 1476 7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe 85 PID 3604 wrote to memory of 2480 3604 cmd.exe 87 PID 3604 wrote to memory of 2480 3604 cmd.exe 87 PID 3604 wrote to memory of 2480 3604 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe"C:\Users\Admin\AppData\Local\Temp\7d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\7D6057~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2480
-
-
-
C:\Program Files\Deuvw.exe"C:\\Program Files\\Deuvw.exe" -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Program Files\Deuvw.exe"C:\Program Files\Deuvw.exe" -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD5d4a3ce48cefcad6ef68222189195adb5
SHA1fba76b5c3190e8cca9ce9c42620195fe9ba0e30d
SHA2567d605778879fe4f049022d626625f93860c60db89e58802b108dfadb3b0ce683
SHA512e3fd2fc09dc3f33bfb4f1a76010b4fc79d880acd6ca701a2d10f4fe36f4289450f49b78bb012ddc9331772207b5c759192396811e4e3b3ffb61e2a4c72caedb7