Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2023 14:28

General

  • Target

    Rybkdr.exe

  • Size

    1.1MB

  • MD5

    d6393631100d7160ca348397cb01943d

  • SHA1

    3ff0803ae9fd31efc74bcb29006c1cbf29b03f75

  • SHA256

    eea977d6c736325a557a0c31552c49c51399748fc138db772735109fb6510757

  • SHA512

    efef9bd64c68757c762a2fdbeb21cc6fc504b85dfd4f468b13504b00b365b58cd83aad3dbbc1cc12c8688d74777d69d6e09685cc9310a0cd29885f6a74fea576

  • SSDEEP

    24576:X1uC5JT92RkNSIXtzdf1ZOS0e42xWVYknV3G/Z:AKfRdtsS0e4GIV3GR

Malware Config

Signatures

  • Detect PureLogs payload 1 IoCs
  • PureLogs

    PureLogs is an infostealer written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
    "C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
      C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
      2⤵
        PID:2820
      • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
        C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
        2⤵
          PID:1084
        • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
          C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
          2⤵
            PID:2032
          • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
            C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
            2⤵
              PID:1064
            • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
              C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
              2⤵
                PID:2352
              • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                2⤵
                  PID:1976
                • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                  C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                  2⤵
                    PID:2624
                  • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                    C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                    2⤵
                      PID:2604
                    • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                      C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                      2⤵
                        PID:2696
                      • C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                        C:\Users\Admin\AppData\Local\Temp\Rybkdr.exe
                        2⤵
                          PID:2712

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/2236-0-0x0000000000360000-0x0000000000486000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/2236-1-0x00000000742C0000-0x00000000749AE000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/2236-2-0x0000000004150000-0x00000000041AA000-memory.dmp

                        Filesize

                        360KB

                      • memory/2236-3-0x0000000004240000-0x0000000004280000-memory.dmp

                        Filesize

                        256KB

                      • memory/2236-4-0x00000000041B0000-0x00000000041F2000-memory.dmp

                        Filesize

                        264KB

                      • memory/2236-5-0x00000000041F0000-0x0000000004230000-memory.dmp

                        Filesize

                        256KB

                      • memory/2236-6-0x0000000004280000-0x00000000042CC000-memory.dmp

                        Filesize

                        304KB

                      • memory/2236-8-0x00000000742C0000-0x00000000749AE000-memory.dmp

                        Filesize

                        6.9MB