Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 01:54
Static task
static1
Behavioral task
behavioral1
Sample
0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe
Resource
win7-20240729-en
General
-
Target
0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe
-
Size
3.0MB
-
MD5
7d727d7f3aa689290a1aff5f7044a0e6
-
SHA1
1feab9c662fb65ccd7a5e53759e46805ecf0470b
-
SHA256
0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580
-
SHA512
bbf92f6d892a58a6087efc4e5f77ff08654fc7a48ea61982cc52c7d333fecc1b2a325614cd01595e7c23d383609b934fc1fd731242a90e3b4e42e61e50ea33fd
-
SSDEEP
49152:t0SsdKAeAMsNfnrlG4i77uB48ROuiQzVnYixYLR686UYVEQYHm+ewrYG:v/6NfnrlG4i7aXzxmLjH99V
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2576-65-0x0000000010000000-0x0000000010231000-memory.dmp purplefox_rootkit behavioral1/memory/1660-80-0x0000000010000000-0x0000000010231000-memory.dmp purplefox_rootkit behavioral1/memory/1300-92-0x0000000010000000-0x0000000010231000-memory.dmp purplefox_rootkit -
Purplefox family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys smss.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" smss.exe -
Executes dropped EXE 3 IoCs
pid Process 2576 smss.exe 1660 smss.exe 1300 smss.exe -
Loads dropped DLL 11 IoCs
pid Process 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 2576 smss.exe 2576 smss.exe 2576 smss.exe 1660 smss.exe 1660 smss.exe 1660 smss.exe 1660 smss.exe 1300 smss.exe 1300 smss.exe 1300 smss.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\smss.exe smss.exe File opened for modification C:\Windows\SysWOW64\smss.exe smss.exe -
resource yara_rule behavioral1/memory/2748-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/2748-38-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\smss.exe smss.exe File created C:\Windows\Fonts\smss.zip 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe File created C:\Windows\Fonts\smss.exe 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe File opened for modification C:\Windows\Fonts\smss.exe 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 584 cmd.exe 1412 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1412 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1300 smss.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1300 smss.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2576 smss.exe Token: SeLoadDriverPrivilege 1300 smss.exe Token: 33 1300 smss.exe Token: SeIncBasePriorityPrivilege 1300 smss.exe Token: 33 1300 smss.exe Token: SeIncBasePriorityPrivilege 1300 smss.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2576 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 31 PID 2748 wrote to memory of 2576 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 31 PID 2748 wrote to memory of 2576 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 31 PID 2748 wrote to memory of 2576 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 31 PID 2748 wrote to memory of 2576 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 31 PID 2748 wrote to memory of 2576 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 31 PID 2748 wrote to memory of 2576 2748 0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe 31 PID 1660 wrote to memory of 1300 1660 smss.exe 33 PID 1660 wrote to memory of 1300 1660 smss.exe 33 PID 1660 wrote to memory of 1300 1660 smss.exe 33 PID 1660 wrote to memory of 1300 1660 smss.exe 33 PID 1660 wrote to memory of 1300 1660 smss.exe 33 PID 1660 wrote to memory of 1300 1660 smss.exe 33 PID 1660 wrote to memory of 1300 1660 smss.exe 33 PID 2576 wrote to memory of 584 2576 smss.exe 34 PID 2576 wrote to memory of 584 2576 smss.exe 34 PID 2576 wrote to memory of 584 2576 smss.exe 34 PID 2576 wrote to memory of 584 2576 smss.exe 34 PID 2576 wrote to memory of 584 2576 smss.exe 34 PID 2576 wrote to memory of 584 2576 smss.exe 34 PID 2576 wrote to memory of 584 2576 smss.exe 34 PID 584 wrote to memory of 1412 584 cmd.exe 36 PID 584 wrote to memory of 1412 584 cmd.exe 36 PID 584 wrote to memory of 1412 584 cmd.exe 36 PID 584 wrote to memory of 1412 584 cmd.exe 36 PID 584 wrote to memory of 1412 584 cmd.exe 36 PID 584 wrote to memory of 1412 584 cmd.exe 36 PID 584 wrote to memory of 1412 584 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe"C:\Users\Admin\AppData\Local\Temp\0a5c38821be6842b1c3126e0d4a89e95e42e4d35752532afc8d70bf6f6b4a580.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\Fonts\smss.exeC:\Windows\Fonts\\smss.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Windows\Fonts\smss.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1412
-
-
-
-
C:\Windows\SysWOW64\smss.exeC:\Windows\SysWOW64\smss.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\smss.exeC:\Windows\SysWOW64\smss.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5b5254c431920ccb4e80db0391b287249
SHA1ee1517b0f8940cce9b1a2aa95bce3f5df6ea8d9d
SHA256ad1c6b58e8f4f14d53f2128f20b4c66280a4835d6172b9a0c6eae10db3d40c6e
SHA512fff711a3239123e7099f6b151167312b64ce82a846888569b5f8bf8b8cab835546a33220118338f0ed015980f4fd8547302c778ae1e33ca09e88d74f7ee332ad