Analysis

  • max time kernel
    167s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/11/2022, 20:59

General

  • Target

    PurifySoulsBeta.exe

  • Size

    40.0MB

  • MD5

    295a42d42e80370d44417e81b3244f28

  • SHA1

    a4080cf54ea3d4114eedd850e8c37e8aaa88562d

  • SHA256

    b61225d3b3cebd16bded2d3c8cd53f0bdbe8562b3a4ea3ee2829adc0c6dba67f

  • SHA512

    b02df6c66dcaa0e11415743c1b72f106d9b9dc39c1fb00ab2155a8fc2cfc75ca4ce3ec253e83261cb5e824d79b151e2514f4957763513de3528f5645df523f1b

  • SSDEEP

    393216:p1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfT:pMguj8Q4VfvvqFTrYvI

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PurifySoulsBeta.exe
    "C:\Users\Admin\AppData\Local\Temp\PurifySoulsBeta.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4820
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get totalphysicalmemory"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic computersystem get totalphysicalmemory
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4872
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4384
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4456
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1524
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4412
    • C:\Windows\System32\itnv73.exe
      "C:\Windows\System32\itnv73.exe"
      1⤵
        PID:4988

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \Users\Admin\AppData\Local\Temp\pkg\fe93f655e0ef6e1e3fae45bb1477caa14c81e96977357e94c304fa07e8e833b1\node-dpapi.node

              Filesize

              141KB

              MD5

              29da91584b19ce6261534e0e26dd2484

              SHA1

              b0c74b6911436196f3404762e2e9f1e4dbfd73ca

              SHA256

              fe93f655e0ef6e1e3fae45bb1477caa14c81e96977357e94c304fa07e8e833b1

              SHA512

              27199dfb5304ecd24d2da4de3acf0237cf80910afe3f4c7593f9c0a13a91d488bcccbb13af0d0993c61e8f4d928d4621eaa911cfc3a5ffa9203dc1817aca5f7c