Analysis

  • max time kernel
    7s
  • max time network
    439s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2023 19:12

General

  • Target

    CyberGhostVPNSetup (2).exe

  • Size

    127KB

  • MD5

    fd093f3100a56b710c50d41667da7e2b

  • SHA1

    5ec9063e4380f642d2a551da76fd4d3f00fd4c96

  • SHA256

    f6dfae75fd23c0446ec1721994cf2530c66bd76366423176414747b39153bf58

  • SHA512

    d3daebf6e3669a4b2a944e60d97c86fd31878cea66e252f05ea8d23f92c1f02ef8e6f4dda250b979a9b9df3fa71dc43c4ab98e2cae52e7687861d1e9a3dd09c0

  • SSDEEP

    3072:ACNd5JY06+ywjDnJShh8N7JNzFrxO/DLxPO4GV:TNVPtVQ7LtOz

Score
10/10

Malware Config

Signatures

  • Detect PureLogs payload 1 IoCs
  • PureLogs

    PureLogs is an infostealer written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CyberGhostVPNSetup (2).exe
    "C:\Users\Admin\AppData\Local\Temp\CyberGhostVPNSetup (2).exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Program Files\794e1281-90b0-4ba7-85fc-f1deafd114cd\759852cb-80b0-41ff-9693-434ff9b4e818.exe
      "C:\Program Files\794e1281-90b0-4ba7-85fc-f1deafd114cd\759852cb-80b0-41ff-9693-434ff9b4e818.exe" "C:\Users\Admin\AppData\Local\Temp\CyberGhostVPNSetup (2).exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\794e1281-90b0-4ba7-85fc-f1deafd114cd\759852cb-80b0-41ff-9693-434ff9b4e818.exe

    Filesize

    5.0MB

    MD5

    72540194bd451dac050609406eb50a56

    SHA1

    57c33ec10f90f81f6abc612b4d251510c36ebd6b

    SHA256

    3a18d5fd76abcfe537d78457dab4797231af313028b5594231f019245c5f7a74

    SHA512

    ec9b24c877e82269aba78701a9828879e8b91580c4d3002227ee18868b8db76b6c0fba08e687aba1ea3127eea05e37124e2b615c224b33e4dac2512dbefb3444

  • C:\Program Files\794e1281-90b0-4ba7-85fc-f1deafd114cd\759852cb-80b0-41ff-9693-434ff9b4e818.exe

    Filesize

    5.0MB

    MD5

    72540194bd451dac050609406eb50a56

    SHA1

    57c33ec10f90f81f6abc612b4d251510c36ebd6b

    SHA256

    3a18d5fd76abcfe537d78457dab4797231af313028b5594231f019245c5f7a74

    SHA512

    ec9b24c877e82269aba78701a9828879e8b91580c4d3002227ee18868b8db76b6c0fba08e687aba1ea3127eea05e37124e2b615c224b33e4dac2512dbefb3444

  • C:\Program Files\794e1281-90b0-4ba7-85fc-f1deafd114cd\759852cb-80b0-41ff-9693-434ff9b4e818.exe

    Filesize

    5.0MB

    MD5

    72540194bd451dac050609406eb50a56

    SHA1

    57c33ec10f90f81f6abc612b4d251510c36ebd6b

    SHA256

    3a18d5fd76abcfe537d78457dab4797231af313028b5594231f019245c5f7a74

    SHA512

    ec9b24c877e82269aba78701a9828879e8b91580c4d3002227ee18868b8db76b6c0fba08e687aba1ea3127eea05e37124e2b615c224b33e4dac2512dbefb3444

  • C:\Users\Admin\AppData\Local\Temp\TmpAFD7.tmp

    Filesize

    2KB

    MD5

    647f843626b023aaaa748f924f95ac25

    SHA1

    652cacf99409e3dcd39b6eb8839c16d22b1800e8

    SHA256

    732dee732e0261afbfba21eca43008a5009cfc9e4c405ece8826a9746564cceb

    SHA512

    61093dcbe07efa5bdffec4933243168bf40b8159bc5a9840552bc3ea8e7c129156276a8548c658e5267bf0b8c4448dcb5c8ab10140c72ed48eb8910c075022fa

  • memory/1648-0-0x00000000001E0000-0x0000000000202000-memory.dmp

    Filesize

    136KB

  • memory/1648-1-0x00007FFF7BA00000-0x00007FFF7C4C1000-memory.dmp

    Filesize

    10.8MB

  • memory/1648-2-0x000000001AED0000-0x000000001AEE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-3-0x000000001BDC0000-0x000000001BF82000-memory.dmp

    Filesize

    1.8MB

  • memory/1648-4-0x000000001C4C0000-0x000000001C9E8000-memory.dmp

    Filesize

    5.2MB

  • memory/1648-103-0x000000001AED0000-0x000000001AEE0000-memory.dmp

    Filesize

    64KB

  • memory/1648-100-0x00007FFF7BA00000-0x00007FFF7C4C1000-memory.dmp

    Filesize

    10.8MB

  • memory/3084-66-0x000001E73D490000-0x000001E73D498000-memory.dmp

    Filesize

    32KB

  • memory/3084-73-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB

  • memory/3084-52-0x000001E7239A0000-0x000001E7239A8000-memory.dmp

    Filesize

    32KB

  • memory/3084-53-0x000001E723B10000-0x000001E723BA4000-memory.dmp

    Filesize

    592KB

  • memory/3084-54-0x000001E7220B0000-0x000001E7220BA000-memory.dmp

    Filesize

    40KB

  • memory/3084-55-0x000001E723AB0000-0x000001E723ABA000-memory.dmp

    Filesize

    40KB

  • memory/3084-56-0x000001E73C3D0000-0x000001E73C470000-memory.dmp

    Filesize

    640KB

  • memory/3084-57-0x000001E723AE0000-0x000001E723AFA000-memory.dmp

    Filesize

    104KB

  • memory/3084-58-0x000001E73C560000-0x000001E73C5A6000-memory.dmp

    Filesize

    280KB

  • memory/3084-59-0x000001E73C6F0000-0x000001E73C6FE000-memory.dmp

    Filesize

    56KB

  • memory/3084-60-0x000001E73C700000-0x000001E73C72A000-memory.dmp

    Filesize

    168KB

  • memory/3084-61-0x000001E73C730000-0x000001E73C738000-memory.dmp

    Filesize

    32KB

  • memory/3084-62-0x000001E73CA30000-0x000001E73CA38000-memory.dmp

    Filesize

    32KB

  • memory/3084-63-0x000001E73CD90000-0x000001E73CD98000-memory.dmp

    Filesize

    32KB

  • memory/3084-64-0x000001E73D390000-0x000001E73D398000-memory.dmp

    Filesize

    32KB

  • memory/3084-65-0x000001E73D430000-0x000001E73D438000-memory.dmp

    Filesize

    32KB

  • memory/3084-67-0x000001E73D4D0000-0x000001E73D4D8000-memory.dmp

    Filesize

    32KB

  • memory/3084-50-0x000001E723A10000-0x000001E723AA6000-memory.dmp

    Filesize

    600KB

  • memory/3084-69-0x000001E73D6D0000-0x000001E73D6D8000-memory.dmp

    Filesize

    32KB

  • memory/3084-68-0x000001E73D670000-0x000001E73D678000-memory.dmp

    Filesize

    32KB

  • memory/3084-70-0x000001E73D7B0000-0x000001E73D7B8000-memory.dmp

    Filesize

    32KB

  • memory/3084-71-0x000001E73D830000-0x000001E73D838000-memory.dmp

    Filesize

    32KB

  • memory/3084-72-0x000001E73D990000-0x000001E73D9A6000-memory.dmp

    Filesize

    88KB

  • memory/3084-51-0x000001E722090000-0x000001E722098000-memory.dmp

    Filesize

    32KB

  • memory/3084-75-0x000001E73FB60000-0x000001E73FB68000-memory.dmp

    Filesize

    32KB

  • memory/3084-74-0x000001E73FB50000-0x000001E73FB58000-memory.dmp

    Filesize

    32KB

  • memory/3084-76-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB

  • memory/3084-78-0x000001E73FFE0000-0x000001E73FFEE000-memory.dmp

    Filesize

    56KB

  • memory/3084-77-0x000001E740010000-0x000001E740048000-memory.dmp

    Filesize

    224KB

  • memory/3084-80-0x000001E740FE0000-0x000001E74101A000-memory.dmp

    Filesize

    232KB

  • memory/3084-79-0x000001E740050000-0x000001E740088000-memory.dmp

    Filesize

    224KB

  • memory/3084-49-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB

  • memory/3084-95-0x000001E741050000-0x000001E741072000-memory.dmp

    Filesize

    136KB

  • memory/3084-96-0x000001E73FFF0000-0x000001E73FFFA000-memory.dmp

    Filesize

    40KB

  • memory/3084-97-0x000001E741080000-0x000001E7410BA000-memory.dmp

    Filesize

    232KB

  • memory/3084-98-0x000001E7410C0000-0x000001E741172000-memory.dmp

    Filesize

    712KB

  • memory/3084-99-0x000001E741170000-0x000001E741182000-memory.dmp

    Filesize

    72KB

  • memory/3084-47-0x000001E721760000-0x000001E721C70000-memory.dmp

    Filesize

    5.1MB

  • memory/3084-102-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB

  • memory/3084-101-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB

  • memory/3084-48-0x00007FFF7BA00000-0x00007FFF7C4C1000-memory.dmp

    Filesize

    10.8MB

  • memory/3084-104-0x00007FFF7BA00000-0x00007FFF7C4C1000-memory.dmp

    Filesize

    10.8MB

  • memory/3084-105-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB

  • memory/3084-106-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB

  • memory/3084-107-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB

  • memory/3084-109-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB

  • memory/3084-108-0x000001E7220C0000-0x000001E7220D0000-memory.dmp

    Filesize

    64KB