Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 02:30
Behavioral task
behavioral1
Sample
7199c9f3d8524e27b8fd14131f0992eb16433d0aa21563805f7fee29e773e719.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7199c9f3d8524e27b8fd14131f0992eb16433d0aa21563805f7fee29e773e719.exe
Resource
win10v2004-20240226-en
General
-
Target
7199c9f3d8524e27b8fd14131f0992eb16433d0aa21563805f7fee29e773e719.exe
-
Size
320KB
-
MD5
857f57632320c296ed42603d5dc50753
-
SHA1
5383f9059896b7f871d7c974ed887aced42789f7
-
SHA256
7199c9f3d8524e27b8fd14131f0992eb16433d0aa21563805f7fee29e773e719
-
SHA512
269b4f8961667c44edef79527cb70b5b53e5dd062fc4a4e28ab79ba4049415c29499b0cb1f9f0967a03dda197a3ff3784316e73171e479449daa461230da4930
-
SSDEEP
6144:6PBJmR7777rL0DWuRbao46Li4/bPrCt9UHNxizH+zyfw4spWJy:6PmjuRbn4qjTPOtQNxDzyo4spl
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2700-0-0x0000000001050000-0x00000000010A4000-memory.dmp family_purelog_stealer behavioral1/memory/2700-2-0x000000001AE80000-0x000000001AF00000-memory.dmp family_purelog_stealer -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7199c9f3d8524e27b8fd14131f0992eb16433d0aa21563805f7fee29e773e719.exedescription pid process Token: SeDebugPrivilege 2700 7199c9f3d8524e27b8fd14131f0992eb16433d0aa21563805f7fee29e773e719.exe