Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/04/2025, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe
Resource
win10v2004-20250410-en
General
-
Target
16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe
-
Size
491KB
-
MD5
687c0c12bf3635877c3b00289335e732
-
SHA1
8c6d1871031b877a93ee83dcdbc8984fc79467a9
-
SHA256
16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4
-
SHA512
a95bd620d9231bd0c782e89f211f7e34945cf4c5073c8fce794f20751bc07cb489d74285be48016fc63c76f960c6fea3b74f7f9e15972855321bc91f765249f9
-
SSDEEP
6144:GpoMkequERu8qQ1fjYMMW9eKZH+IdISTUL24qL9cPKcPzR2R06lZv:oDR+u8pfjYMMWNvdhUSByFPzyv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3580-6-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3580-5-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4796-17-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4796-19-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/6044-26-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/6044-25-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4796-16-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4796-14-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/4796-13-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3580-2-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit behavioral2/memory/3580-3-0x0000000010000000-0x00000000101D0000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral2/memory/3580-6-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3580-5-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4796-17-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4796-19-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/6044-26-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/6044-25-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4796-16-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4796-14-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/4796-13-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3580-2-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat behavioral2/memory/3580-3-0x0000000010000000-0x00000000101D0000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Executes dropped EXE 2 IoCs
pid Process 4796 Skcsk.exe 6044 Skcsk.exe -
resource yara_rule behavioral2/memory/3580-0-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3580-6-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3580-5-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4796-17-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4796-19-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/6044-26-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/6044-25-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4796-16-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4796-14-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4796-13-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/4796-11-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3580-2-0x0000000010000000-0x00000000101D0000-memory.dmp upx behavioral2/memory/3580-3-0x0000000010000000-0x00000000101D0000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Skcsk.exe 16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe File opened for modification C:\Program Files\Skcsk.exe 16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skcsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Skcsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1772 cmd.exe 808 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 808 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3580 16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3580 wrote to memory of 1772 3580 16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe 79 PID 3580 wrote to memory of 1772 3580 16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe 79 PID 3580 wrote to memory of 1772 3580 16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe 79 PID 4796 wrote to memory of 6044 4796 Skcsk.exe 81 PID 4796 wrote to memory of 6044 4796 Skcsk.exe 81 PID 4796 wrote to memory of 6044 4796 Skcsk.exe 81 PID 1772 wrote to memory of 808 1772 cmd.exe 82 PID 1772 wrote to memory of 808 1772 cmd.exe 82 PID 1772 wrote to memory of 808 1772 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe"C:\Users\Admin\AppData\Local\Temp\16ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\16FFA6~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:808
-
-
-
C:\Program Files\Skcsk.exe"C:\Program Files\Skcsk.exe" -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files\Skcsk.exe"C:\Program Files\Skcsk.exe" -acsi2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6044
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD5687c0c12bf3635877c3b00289335e732
SHA18c6d1871031b877a93ee83dcdbc8984fc79467a9
SHA25616ffa6fd3f16370b267266920dd108ab80077f58269f1b793bb6d97d618aefa4
SHA512a95bd620d9231bd0c782e89f211f7e34945cf4c5073c8fce794f20751bc07cb489d74285be48016fc63c76f960c6fea3b74f7f9e15972855321bc91f765249f9