Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
02-05-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe
Resource
win10-20240404-en
General
-
Target
f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe
-
Size
400KB
-
MD5
273f874fb8cf5f0ea683569cc5aa1105
-
SHA1
75e0c12ddd0bf9d26e8ce5e014b2ff52476d3884
-
SHA256
f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4
-
SHA512
03b1faa4a531837b6201abe4089cbfe89119c71a88cfdfa14e216040bed8cbab8595dc5c8e834fac4fedede8fd55e6982a7a9a29869b0dd30a838491959fef54
-
SSDEEP
12288:bixfqg8gtc1Ue6JGNHvrWJwdrO//2M9+Y5:bCfqZuQUe6Ji1O/F7
Malware Config
Extracted
raccoon
5bfc2fea32660a3c43ec3fa8f7188f7e
http://91.103.252.109:80
-
user_agent
SunShineMoonLight
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000016a29-4.dat family_purelog_stealer behavioral1/memory/2372-7-0x0000000001160000-0x00000000011BA000-memory.dmp family_purelog_stealer -
Raccoon Stealer V2 payload 4 IoCs
resource yara_rule behavioral1/memory/2648-23-0x0000000000400000-0x000000000041B000-memory.dmp family_raccoon_v2 behavioral1/memory/2648-27-0x0000000000400000-0x000000000041B000-memory.dmp family_raccoon_v2 behavioral1/memory/2648-32-0x0000000000400000-0x000000000041B000-memory.dmp family_raccoon_v2 behavioral1/memory/2648-33-0x0000000000400000-0x000000000041B000-memory.dmp family_raccoon_v2 -
Executes dropped EXE 2 IoCs
pid Process 2372 countrycyber.exe 2648 countrycyber.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 countrycyber.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2372 set thread context of 2648 2372 countrycyber.exe 29 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2372 countrycyber.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2372 1736 f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe 28 PID 1736 wrote to memory of 2372 1736 f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe 28 PID 1736 wrote to memory of 2372 1736 f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe 28 PID 1736 wrote to memory of 2372 1736 f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe 28 PID 2372 wrote to memory of 2648 2372 countrycyber.exe 29 PID 2372 wrote to memory of 2648 2372 countrycyber.exe 29 PID 2372 wrote to memory of 2648 2372 countrycyber.exe 29 PID 2372 wrote to memory of 2648 2372 countrycyber.exe 29 PID 2372 wrote to memory of 2648 2372 countrycyber.exe 29 PID 2372 wrote to memory of 2648 2372 countrycyber.exe 29 PID 2372 wrote to memory of 2648 2372 countrycyber.exe 29 PID 2372 wrote to memory of 2648 2372 countrycyber.exe 29 PID 2372 wrote to memory of 2648 2372 countrycyber.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe"C:\Users\Admin\AppData\Local\Temp\f2d0b699237e80c6347e18250fb751f8876e52821ace6b497e2870d472ed5fa4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\countrycyber.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\countrycyber.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\countrycyber.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\countrycyber.exe3⤵
- Executes dropped EXE
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357KB
MD5c643acf3f644f9e94305a546365fb300
SHA18e270c565228ec7e6856220fc8b726914430c456
SHA2569c5fb4465f201e05e9a0a6ae79fa8a27b48035f9a2a3f910c6e675ae24c53afa
SHA5128d16986b4ac1a8673310d4eccf3bcd62f0696bdd134716e37b49e959ef4a97cb1b4d4bfb8abaebd34cd3900ef4b6d479575e0dc29211120809b48fc1b55c7394