Analysis

  • max time kernel
    179s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/11/2022, 20:59

General

  • Target

    PurifySoulsBeta.exe

  • Size

    40.0MB

  • MD5

    295a42d42e80370d44417e81b3244f28

  • SHA1

    a4080cf54ea3d4114eedd850e8c37e8aaa88562d

  • SHA256

    b61225d3b3cebd16bded2d3c8cd53f0bdbe8562b3a4ea3ee2829adc0c6dba67f

  • SHA512

    b02df6c66dcaa0e11415743c1b72f106d9b9dc39c1fb00ab2155a8fc2cfc75ca4ce3ec253e83261cb5e824d79b151e2514f4957763513de3528f5645df523f1b

  • SSDEEP

    393216:p1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfT:pMguj8Q4VfvvqFTrYvI

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PurifySoulsBeta.exe
    "C:\Users\Admin\AppData\Local\Temp\PurifySoulsBeta.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:5064
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get totalphysicalmemory"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic computersystem get totalphysicalmemory
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2252
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1008
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3640
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4600
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k SDRSVC
      1⤵
        PID:3352
      • C:\Windows\System32\zn0yel.exe
        "C:\Windows\System32\zn0yel.exe"
        1⤵
          PID:1316

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\pkg\fe93f655e0ef6e1e3fae45bb1477caa14c81e96977357e94c304fa07e8e833b1\node-dpapi.node

                Filesize

                141KB

                MD5

                29da91584b19ce6261534e0e26dd2484

                SHA1

                b0c74b6911436196f3404762e2e9f1e4dbfd73ca

                SHA256

                fe93f655e0ef6e1e3fae45bb1477caa14c81e96977357e94c304fa07e8e833b1

                SHA512

                27199dfb5304ecd24d2da4de3acf0237cf80910afe3f4c7593f9c0a13a91d488bcccbb13af0d0993c61e8f4d928d4621eaa911cfc3a5ffa9203dc1817aca5f7c