Analysis
-
max time kernel
123s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 12:41
Static task
static1
Behavioral task
behavioral1
Sample
6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe
Resource
win7-20240903-en
General
-
Target
6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe
-
Size
412KB
-
MD5
96dfb9cdb8230f73542cfd0e3ace17eb
-
SHA1
d3c0c7896fc83021970ede243867530f78a3049f
-
SHA256
6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3
-
SHA512
3464482a5f9a68645f7717bd6e02e06352b8826b1ec5106af1bade99ebd993fea1f19541bb0a1123b69ebde31db2dd44ab174844979f12865320332b905699e1
-
SSDEEP
12288:fl8uWPifKE9CdhlkidOEn6EM55uwNuAQj:fl8uLfKE96h/OEnV6ej
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2280-3-0x0000000010000000-0x00000000101BE000-memory.dmp purplefox_rootkit behavioral1/memory/2280-4-0x0000000010000000-0x00000000101BE000-memory.dmp purplefox_rootkit behavioral1/memory/2280-2-0x0000000010000000-0x00000000101BE000-memory.dmp purplefox_rootkit behavioral1/memory/2984-18-0x0000000010000000-0x00000000101BE000-memory.dmp purplefox_rootkit behavioral1/memory/2984-22-0x0000000010000000-0x00000000101BE000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2280-3-0x0000000010000000-0x00000000101BE000-memory.dmp family_gh0strat behavioral1/memory/2280-4-0x0000000010000000-0x00000000101BE000-memory.dmp family_gh0strat behavioral1/memory/2280-2-0x0000000010000000-0x00000000101BE000-memory.dmp family_gh0strat behavioral1/memory/2984-18-0x0000000010000000-0x00000000101BE000-memory.dmp family_gh0strat behavioral1/memory/2984-22-0x0000000010000000-0x00000000101BE000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Deletes itself 1 IoCs
pid Process 1780 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 sainbox.exe -
Loads dropped DLL 2 IoCs
pid Process 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: sainbox.exe File opened (read-only) \??\G: sainbox.exe File opened (read-only) \??\H: sainbox.exe File opened (read-only) \??\K: sainbox.exe File opened (read-only) \??\S: sainbox.exe File opened (read-only) \??\W: sainbox.exe File opened (read-only) \??\X: sainbox.exe File opened (read-only) \??\J: sainbox.exe File opened (read-only) \??\N: sainbox.exe File opened (read-only) \??\R: sainbox.exe File opened (read-only) \??\V: sainbox.exe File opened (read-only) \??\Z: sainbox.exe File opened (read-only) \??\E: sainbox.exe File opened (read-only) \??\I: sainbox.exe File opened (read-only) \??\L: sainbox.exe File opened (read-only) \??\O: sainbox.exe File opened (read-only) \??\P: sainbox.exe File opened (read-only) \??\B: sainbox.exe File opened (read-only) \??\M: sainbox.exe File opened (read-only) \??\Q: sainbox.exe File opened (read-only) \??\T: sainbox.exe File opened (read-only) \??\U: sainbox.exe -
resource yara_rule behavioral1/memory/2280-0-0x0000000010000000-0x00000000101BE000-memory.dmp upx behavioral1/memory/2280-3-0x0000000010000000-0x00000000101BE000-memory.dmp upx behavioral1/memory/2280-4-0x0000000010000000-0x00000000101BE000-memory.dmp upx behavioral1/memory/2280-2-0x0000000010000000-0x00000000101BE000-memory.dmp upx behavioral1/memory/2984-18-0x0000000010000000-0x00000000101BE000-memory.dmp upx behavioral1/memory/2984-22-0x0000000010000000-0x00000000101BE000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sainbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1780 cmd.exe 2788 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sainbox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz sainbox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2788 PING.EXE -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe 2984 sainbox.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2984 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe 30 PID 2280 wrote to memory of 2984 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe 30 PID 2280 wrote to memory of 2984 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe 30 PID 2280 wrote to memory of 2984 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe 30 PID 2280 wrote to memory of 1780 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe 31 PID 2280 wrote to memory of 1780 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe 31 PID 2280 wrote to memory of 1780 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe 31 PID 2280 wrote to memory of 1780 2280 6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe 31 PID 1780 wrote to memory of 2788 1780 cmd.exe 33 PID 1780 wrote to memory of 2788 1780 cmd.exe 33 PID 1780 wrote to memory of 2788 1780 cmd.exe 33 PID 1780 wrote to memory of 2788 1780 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe"C:\Users\Admin\AppData\Local\Temp\6b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\sainbox.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\sainbox.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\6B3A2C~1.EXE > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD596dfb9cdb8230f73542cfd0e3ace17eb
SHA1d3c0c7896fc83021970ede243867530f78a3049f
SHA2566b3a2c157f5ec50da433b83753ccbb5e71e2266172bd9f052db27ad000e167b3
SHA5123464482a5f9a68645f7717bd6e02e06352b8826b1ec5106af1bade99ebd993fea1f19541bb0a1123b69ebde31db2dd44ab174844979f12865320332b905699e1