Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 04:18

General

  • Target

    c7918ef5524f469ce51b12b9c5f74b4f3dffbd21b16e0c31900dc2f0a3807b7e.exe

  • Size

    3.8MB

  • MD5

    7ba43205372be81c1542ab2e6f840370

  • SHA1

    8c5d1773627508be2e70fd6a0fab873b40d9874b

  • SHA256

    c7918ef5524f469ce51b12b9c5f74b4f3dffbd21b16e0c31900dc2f0a3807b7e

  • SHA512

    10dd14c2a2e90d734000a5b0ef9d6e89ea5748ce5dfe9b619731351b6498dabc4e521e9946c1e996de3a1e0ebcdd443ee902525199fe75a95954997816eea4a3

  • SSDEEP

    98304:NZJt4HINy2LkNBvY62Js0aW2LLqnHMlLrmUWEUd3wJ:fiINy2LkNBg62WW2+aPmhE1

Malware Config

Signatures

  • Detect PurpleFox Rootkit 9 IoCs

    Detect PurpleFox Rootkit.

  • Gh0st RAT payload 9 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • PurpleFox

    PurpleFox is an exploit kit used to distribute other malware families and first seen in 2018.

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7918ef5524f469ce51b12b9c5f74b4f3dffbd21b16e0c31900dc2f0a3807b7e.exe
    "C:\Users\Admin\AppData\Local\Temp\c7918ef5524f469ce51b12b9c5f74b4f3dffbd21b16e0c31900dc2f0a3807b7e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\RVN.exe
      C:\Users\Admin\AppData\Local\Temp\\RVN.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:2544
    • C:\Users\Admin\AppData\Local\Temp\HD_c7918ef5524f469ce51b12b9c5f74b4f3dffbd21b16e0c31900dc2f0a3807b7e.exe
      C:\Users\Admin\AppData\Local\Temp\HD_c7918ef5524f469ce51b12b9c5f74b4f3dffbd21b16e0c31900dc2f0a3807b7e.exe
      2⤵
      • Executes dropped EXE
      PID:2568
  • C:\Windows\SysWOW64\TXPlatforn.exe
    C:\Windows\SysWOW64\TXPlatforn.exe -auto
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\SysWOW64\TXPlatforn.exe
      C:\Windows\SysWOW64\TXPlatforn.exe -acsi
      2⤵
      • Drops file in Drivers directory
      • Sets service image path in registry
      • Executes dropped EXE
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:2744

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\HD_X.dat
    Filesize

    1.5MB

    MD5

    d5192f8aaf1d0cc978ff5f51ff8bce32

    SHA1

    616ec441efcc39cfc158004f46d407cb909514db

    SHA256

    f1b2caaa59dd4b6da81ad6feb12e3a58c3c094cbdf300454ce3e5f1ef4e13b58

    SHA512

    cbc09e565c8dcf16ea4399071521a8826c2ad91776dfd56328455c82db648d0054790070b43b258cdfc9d5351bcc19703f66ed5f9e6b298ee5b8acfbf8871c81

  • C:\Users\Admin\AppData\Local\Temp\HD_c7918ef5524f469ce51b12b9c5f74b4f3dffbd21b16e0c31900dc2f0a3807b7e.exe
    Filesize

    2.3MB

    MD5

    ece3c77db79320d72585d4e9d2360d87

    SHA1

    cd25bf7c5cbe3251cfeb5980bb22b40c33d63277

    SHA256

    71aa47050ecf945ea440a5fcac95fe6ebff3f1e829d2381abceea8ec18ff712e

    SHA512

    29ac17797c7cc06684f1e69ee40d99bb9b5c20e55da754b5445adac4d6f0701f57bb93073bb5980b6b5d3a340cd2e295082a58aa73f19436dc771689d202163d

  • \Users\Admin\AppData\Local\Temp\RVN.exe
    Filesize

    377KB

    MD5

    80ade1893dec9cab7f2e63538a464fcc

    SHA1

    c06614da33a65eddb506db00a124a3fc3f5be02e

    SHA256

    57a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd

    SHA512

    fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4

  • memory/2392-8-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB

  • memory/2392-7-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB

  • memory/2392-9-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB

  • memory/2392-5-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB

  • memory/2744-28-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB

  • memory/2744-30-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB

  • memory/2744-34-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB

  • memory/2744-72-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB

  • memory/2900-20-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB

  • memory/2900-29-0x0000000010000000-0x00000000101B6000-memory.dmp
    Filesize

    1.7MB