Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2023, 16:13 UTC

General

  • Target

    NEAS.311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452faexe.exe

  • Size

    1.2MB

  • MD5

    64944a1f7d846006e04b6101d40a28b4

  • SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

  • SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

  • SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • SSDEEP

    24576:yV4G6JWrIWNuFYRF4Bs2kpvjpqzeRVXJIcXStT:y4WrIWMietCvjtRVJCJ

Malware Config

Signatures

  • Detect PureLogs payload 4 IoCs
  • Detect ZGRat V1 34 IoCs
  • PureLogs

    PureLogs is an infostealer written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452faexe.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452faexe.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\NEAS.311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452faexe.exe
      C:\Users\Admin\AppData\Local\Temp\NEAS.311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452faexe.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3348
  • C:\Users\Admin\AppData\Local\Exception\djiovb\Default.exe
    C:\Users\Admin\AppData\Local\Exception\djiovb\Default.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Local\Exception\djiovb\Default.exe
      C:\Users\Admin\AppData\Local\Exception\djiovb\Default.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3216
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3832
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2808

Network

    No results found
  • 80.85.241.193:58001
    InstallUtil.exe
    260 B
    5
  • 80.85.241.193:58002
    InstallUtil.exe
    260 B
    5
  • 80.85.241.193:58003
    InstallUtil.exe
    260 B
    5
  • 80.85.241.193:4402
    InstallUtil.exe
    260 B
    5
  • 80.85.241.193:5502
    InstallUtil.exe
    208 B
    4
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Exception\djiovb\Default.exe

    Filesize

    1.2MB

    MD5

    64944a1f7d846006e04b6101d40a28b4

    SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

    SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

    SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • C:\Users\Admin\AppData\Local\Exception\djiovb\Default.exe

    Filesize

    1.2MB

    MD5

    64944a1f7d846006e04b6101d40a28b4

    SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

    SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

    SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • C:\Users\Admin\AppData\Local\Exception\djiovb\Default.exe

    Filesize

    1.2MB

    MD5

    64944a1f7d846006e04b6101d40a28b4

    SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

    SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

    SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Default.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\InstallUtil.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\NEAS.311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452faexe.exe.log

    Filesize

    1KB

    MD5

    84a01db52ea5a878520e162c80acfcd3

    SHA1

    49b7c5c072f6c32e54cc97c1dcbee90de0dd4738

    SHA256

    25ff806b9c85928aee814fa3aebbf45fa9735a7f594a6261f0779e89eb8c3bfe

    SHA512

    0516cbe6b9b7842be7f00ba3159a4df31257fc4e9db8ccb8f9f720801174f3d49327b7881c59ea12a4767c6d3e7c99a3b707c10279dfb39f12f9792134e6248e

  • memory/980-3-0x0000022E7B480000-0x0000022E7B562000-memory.dmp

    Filesize

    904KB

  • memory/980-7-0x0000022E7AD40000-0x0000022E7AD8C000-memory.dmp

    Filesize

    304KB

  • memory/980-6-0x0000022E7B8A0000-0x0000022E7B968000-memory.dmp

    Filesize

    800KB

  • memory/980-5-0x0000022E7B6D0000-0x0000022E7B798000-memory.dmp

    Filesize

    800KB

  • memory/980-4-0x0000022E7B5F0000-0x0000022E7B6D0000-memory.dmp

    Filesize

    896KB

  • memory/980-13-0x00007FFF6CD20000-0x00007FFF6D7E1000-memory.dmp

    Filesize

    10.8MB

  • memory/980-0-0x0000022E78EC0000-0x0000022E78FF8000-memory.dmp

    Filesize

    1.2MB

  • memory/980-2-0x0000022E7B5E0000-0x0000022E7B5F0000-memory.dmp

    Filesize

    64KB

  • memory/980-1-0x00007FFF6CD20000-0x00007FFF6D7E1000-memory.dmp

    Filesize

    10.8MB

  • memory/2808-4405-0x000002699A2E0000-0x000002699A3C4000-memory.dmp

    Filesize

    912KB

  • memory/2808-4403-0x00007FFF6C7E0000-0x00007FFF6D2A1000-memory.dmp

    Filesize

    10.8MB

  • memory/2808-4404-0x00000269B2DB0000-0x00000269B2DC0000-memory.dmp

    Filesize

    64KB

  • memory/2808-6589-0x00007FFF6C7E0000-0x00007FFF6D2A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3216-4395-0x000002B1A7790000-0x000002B1A77E4000-memory.dmp

    Filesize

    336KB

  • memory/3216-4399-0x00007FFF6C7E0000-0x00007FFF6D2A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3216-2213-0x000002B1A77E0000-0x000002B1A77F0000-memory.dmp

    Filesize

    64KB

  • memory/3216-2212-0x00007FFF6C7E0000-0x00007FFF6D2A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3348-20-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-2197-0x000001A002380000-0x000001A002388000-memory.dmp

    Filesize

    32KB

  • memory/3348-36-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-38-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-40-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-42-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-44-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-46-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-48-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-50-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-52-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-54-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-56-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-58-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-60-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-62-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-64-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-66-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-68-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-70-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-74-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-72-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-76-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-34-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-2198-0x000001A01ADB0000-0x000001A01AE06000-memory.dmp

    Filesize

    344KB

  • memory/3348-2199-0x000001A01B130000-0x000001A01B184000-memory.dmp

    Filesize

    336KB

  • memory/3348-2201-0x00007FFF6CD20000-0x00007FFF6D7E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3348-32-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-30-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-8-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/3348-12-0x00007FFF6CD20000-0x00007FFF6D7E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3348-28-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-14-0x000001A01ACA0000-0x000001A01ACB0000-memory.dmp

    Filesize

    64KB

  • memory/3348-26-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-24-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-22-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-18-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-11-0x000001A0022A0000-0x000001A002384000-memory.dmp

    Filesize

    912KB

  • memory/3348-15-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3348-16-0x000001A0022A0000-0x000001A002380000-memory.dmp

    Filesize

    896KB

  • memory/3832-4398-0x0000027E73580000-0x0000027E73590000-memory.dmp

    Filesize

    64KB

  • memory/3832-4397-0x00007FFF6C7E0000-0x00007FFF6D2A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3832-4406-0x00007FFF6C7E0000-0x00007FFF6D2A1000-memory.dmp

    Filesize

    10.8MB

  • memory/4928-2209-0x00007FFF6C7E0000-0x00007FFF6D2A1000-memory.dmp

    Filesize

    10.8MB

  • memory/4928-2204-0x00007FFF6C7E0000-0x00007FFF6D2A1000-memory.dmp

    Filesize

    10.8MB

  • memory/4928-2205-0x00000200EC3B0000-0x00000200EC3C0000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.