Analysis
-
max time kernel
120s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2025 06:59
Static task
static1
Behavioral task
behavioral1
Sample
118.exe
Resource
win7-20241010-en
General
-
Target
118.exe
-
Size
1.4MB
-
MD5
42b9909cc7e6dbc4c0955765eaab281c
-
SHA1
4afad51b172d13831fe807a9a5466b77165728f3
-
SHA256
b9d338ff7f7d63d28c765007e9e150b3c30a9acac1e16bfd0317d375b4fc6166
-
SHA512
8b732acd47f1a261ebdc0e5f18f5733db3f155f61e252e3c9df2da415be76815fbc6d2388cef0e766fd52acc9f4196e967fe7cd24da766fb53201712f0aa72b7
-
SSDEEP
24576:F39WaOyHutimZ9VSly2hVvHW6qMnSbTBBhBMN:598HPkVOBTK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5028-0-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/5028-0-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 43 3628 Process not Found -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 118.exe File opened (read-only) \??\I: 118.exe File opened (read-only) \??\O: 118.exe File opened (read-only) \??\S: 118.exe File opened (read-only) \??\V: 118.exe File opened (read-only) \??\B: 118.exe File opened (read-only) \??\L: 118.exe File opened (read-only) \??\N: 118.exe File opened (read-only) \??\R: 118.exe File opened (read-only) \??\U: 118.exe File opened (read-only) \??\Z: 118.exe File opened (read-only) \??\G: 118.exe File opened (read-only) \??\K: 118.exe File opened (read-only) \??\M: 118.exe File opened (read-only) \??\P: 118.exe File opened (read-only) \??\X: 118.exe File opened (read-only) \??\Y: 118.exe File opened (read-only) \??\J: 118.exe File opened (read-only) \??\Q: 118.exe File opened (read-only) \??\T: 118.exe File opened (read-only) \??\W: 118.exe File opened (read-only) \??\H: 118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2152 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe 5028 118.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 5028 118.exe Token: SeIncBasePriorityPrivilege 5028 118.exe Token: 33 5028 118.exe Token: SeIncBasePriorityPrivilege 5028 118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\118.exe"C:\Users\Admin\AppData\Local\Temp\118.exe"1⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RTVFRjQwNEMtNUUxMS00MDgyLTg0MUYtNjU4NkFCNjI3NTBBfSIgdXNlcmlkPSJ7NTkzQTcwNjQtMDIwOS00ODMzLTk1QkEtRkI4OEE1QUY5Mjk5fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7RjVGQUIwMUMtODUyNy00ODM4LTlGNjktRThGMUY0REFCNURGfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMyMzYiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDI1MTE0ODAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NjUxNjYxMTI1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2152