Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 20:17
Static task
static1
General
-
Target
cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe
-
Size
1.5MB
-
MD5
ac8b50bb675dad257ce3ca9d35d70ea8
-
SHA1
b6df16f4a6c55129182b6982e69fa476c74272c1
-
SHA256
cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63
-
SHA512
5f6cec34ff23bc51eb385b0374d8b52bfbef78e5fe1c8ce2b759c5965f5b03798adb331301a6e21ed87c459f8e826fe11444985f46e2f29f20df98bb8352b256
-
SSDEEP
24576:VOyHutimZ9VSly2hVvHW6qMnSbTBBhBMNYuID:IHPkVOBTKRC
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3940-0-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral1/memory/8-10-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral1/memory/4608-18-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/3940-0-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral1/memory/8-10-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral1/memory/4608-18-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys XOX CPL MAIN.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" XOX CPL MAIN.exe -
Executes dropped EXE 2 IoCs
pid Process 8 XOX CPL MAIN.exe 4608 XOX CPL MAIN.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\XOX CPL MAIN.exe cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe File opened for modification C:\Windows\SysWOW64\XOX CPL MAIN.exe cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XOX CPL MAIN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XOX CPL MAIN.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3068 cmd.exe 3960 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3960 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4608 XOX CPL MAIN.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3940 cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe Token: SeLoadDriverPrivilege 4608 XOX CPL MAIN.exe Token: 33 4608 XOX CPL MAIN.exe Token: SeIncBasePriorityPrivilege 4608 XOX CPL MAIN.exe Token: 33 4608 XOX CPL MAIN.exe Token: SeIncBasePriorityPrivilege 4608 XOX CPL MAIN.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3068 3940 cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe 87 PID 3940 wrote to memory of 3068 3940 cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe 87 PID 3940 wrote to memory of 3068 3940 cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe 87 PID 8 wrote to memory of 4608 8 XOX CPL MAIN.exe 88 PID 8 wrote to memory of 4608 8 XOX CPL MAIN.exe 88 PID 8 wrote to memory of 4608 8 XOX CPL MAIN.exe 88 PID 3068 wrote to memory of 3960 3068 cmd.exe 91 PID 3068 wrote to memory of 3960 3068 cmd.exe 91 PID 3068 wrote to memory of 3960 3068 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe"C:\Users\Admin\AppData\Local\Temp\cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\CBF360~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3960
-
-
-
C:\Windows\SysWOW64\XOX CPL MAIN.exe"C:\Windows\SysWOW64\XOX CPL MAIN.exe" -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\XOX CPL MAIN.exe"C:\Windows\SysWOW64\XOX CPL MAIN.exe" -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5ac8b50bb675dad257ce3ca9d35d70ea8
SHA1b6df16f4a6c55129182b6982e69fa476c74272c1
SHA256cbf36077e9784a1988192458d2576e27cf73cdca1b8c24c513ea4b4ea4aa4d63
SHA5125f6cec34ff23bc51eb385b0374d8b52bfbef78e5fe1c8ce2b759c5965f5b03798adb331301a6e21ed87c459f8e826fe11444985f46e2f29f20df98bb8352b256