Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
01/04/2025, 13:14
Static task
static1
1 signatures
General
-
Target
ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a.exe
-
Size
1.5MB
-
MD5
66653546e70334af1706f22ee465e76d
-
SHA1
f2c2af3d0d6726f4e50df8baf586336079ca6d6a
-
SHA256
ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a
-
SHA512
bd804c5baa937b306fe5ad258141a0a662979143526e650492e1919587b701d122209829051873d7a8ed48ca03a2a44c99a1dbf04ba0d74fc77d17e58c79eac7
-
SSDEEP
24576:VOeh7E7IJbtEJEHng8wGrQTLq73xaH7pbHnI2m:VOWFJbtSMXoTLq73xKTI2m
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/4700-0-0x0000000010000000-0x0000000010199000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/4700-0-0x0000000010000000-0x0000000010199000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4700 ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a.exe 4700 ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4700 ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a.exe 4700 ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a.exe 4700 ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a.exe"C:\Users\Admin\AppData\Local\Temp\ca9dbf12c0739ef2c167c5e6b6eff27783dddbcc5b92b6be0fbab709662f720a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4700