Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/04/2025, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe
Resource
win10v2004-20250410-en
General
-
Target
f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe
-
Size
1.3MB
-
MD5
a566e7fd008f5bb9dbc1a85559e1a985
-
SHA1
85cf49fdbdec95135aefc34a7f4a5c116120a2f2
-
SHA256
f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd
-
SHA512
130875f91be847c9361357ad22f24cdc6173fd61ce4f5b3ab6570c93b9076100c9882c3f43b61a634bd00ff0a6a5f00c32174a6aa8e231b99c6f8cb45ed0850e
-
SSDEEP
24576:AQZoidOTdVZinacCET9Ecl1erdg0MCiVWhFU7cVtgugEnoSE5AeXXK:AQZAdVyVT9n/Gg0P+WhoWgEnoSE5zXXK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2508-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2508-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2508-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1640-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1640-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1832-36-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1640-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1640-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1832-42-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 10 IoCs
resource yara_rule behavioral2/memory/2508-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2508-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2508-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1640-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1640-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/files/0x001900000002b0f8-34.dat family_gh0strat behavioral2/memory/1832-36-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1640-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1640-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1832-42-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240603296.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 5 IoCs
pid Process 2508 svchost.exe 1640 TXPlatforn.exe 5468 svchos.exe 1832 TXPlatforn.exe 4376 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Loads dropped DLL 3 IoCs
pid Process 5468 svchos.exe 6040 svchost.exe 4376 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240603296.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe -
resource yara_rule behavioral2/memory/2508-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2508-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2508-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2508-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1640-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1640-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1832-36-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1640-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1640-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1640-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1832-42-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3688 cmd.exe 5688 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5688 PING.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1832 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2508 svchost.exe Token: SeLoadDriverPrivilege 1832 TXPlatforn.exe Token: 33 1832 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1832 TXPlatforn.exe Token: 33 1832 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1832 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3444 f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe 3444 f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3444 wrote to memory of 2508 3444 f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe 78 PID 3444 wrote to memory of 2508 3444 f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe 78 PID 3444 wrote to memory of 2508 3444 f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe 78 PID 2508 wrote to memory of 3688 2508 svchost.exe 80 PID 2508 wrote to memory of 3688 2508 svchost.exe 80 PID 2508 wrote to memory of 3688 2508 svchost.exe 80 PID 3444 wrote to memory of 5468 3444 f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe 81 PID 3444 wrote to memory of 5468 3444 f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe 81 PID 3444 wrote to memory of 5468 3444 f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe 81 PID 1640 wrote to memory of 1832 1640 TXPlatforn.exe 82 PID 1640 wrote to memory of 1832 1640 TXPlatforn.exe 82 PID 1640 wrote to memory of 1832 1640 TXPlatforn.exe 82 PID 3688 wrote to memory of 5688 3688 cmd.exe 86 PID 3688 wrote to memory of 5688 3688 cmd.exe 86 PID 3688 wrote to memory of 5688 3688 cmd.exe 86 PID 6040 wrote to memory of 4376 6040 svchost.exe 87 PID 6040 wrote to memory of 4376 6040 svchost.exe 87 PID 6040 wrote to memory of 4376 6040 svchost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe"C:\Users\Admin\AppData\Local\Temp\f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Server Software Component: Terminal Services DLL
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5468
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:1036
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6040 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240603296.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4376
-
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Server Software Component
1Terminal Services DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5a566e7fd008f5bb9dbc1a85559e1a985
SHA185cf49fdbdec95135aefc34a7f4a5c116120a2f2
SHA256f772edb73e04e584bfef1352c2ec031c05d73227550d437ab7177bee934f46bd
SHA512130875f91be847c9361357ad22f24cdc6173fd61ce4f5b3ab6570c93b9076100c9882c3f43b61a634bd00ff0a6a5f00c32174a6aa8e231b99c6f8cb45ed0850e
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5fe9a4bc26958bf7df929ffea27c3cfa4
SHA1fcfdc48e17bb851bb329e1e247e790fa421e6a95
SHA256af83be2af6bf4f2dde33d362c0bdc0e00244af4e3c86d7b1b84c852f7dadfacd
SHA51274a5bc0da4917be5fb40e63271a479cc66314f14205ee49994d25a6f051ba7aa5570b11d74d7dcd15d4af2f3ec2b33c63068c4a90f41e0c8ec965097a3b20d01
-
Filesize
40KB
MD522bb5bd901d8b25ac5b41edbb7d5053e
SHA18a935dd8d7e104fc553ff7e8b54a404f7b079334
SHA2568dcaeeebef9b9f3d41d295db145ffb3850f309d089c08125c7fa7034db5fd80e
SHA512cc3fb68fd6791a08e4a7d1a8db8d07cfcc8c9b9dceec10b53f0cb7ee86473303a19be4f23e379f84c59e02d0568e7c066e21cd1300f6032dac4ba52f609f62e7