Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 15:31
Static task
static1
Behavioral task
behavioral1
Sample
IMG79600253.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
IMG79600253.exe
Resource
win10v2004-20240508-en
General
-
Target
IMG79600253.exe
-
Size
66KB
-
MD5
2451fe4d6f61c5160d2c938c144a8a53
-
SHA1
ab101316ff60cda1b7a4bfc1d535c234c0d60936
-
SHA256
9c4b7f8a8732beb18b38ad4a4a853727cfb3da38666b45c4051c76801536bf22
-
SHA512
abc4246b910ac8c997d9f0ec07116f9035e97a2a0410b90414c4ce8bd3deaf2a05c19428749d3ffd486e01ac70979df7a54231b521331092d5d2cbbe7bc95329
-
SSDEEP
1536:Puca4wJAD99k/5/CuojaFLEf2X9JT8GJQ2Hs3hGH:HaP09NgJAGJQ2HpH
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023380-4893.dat family_purelog_stealer behavioral2/memory/4692-4901-0x0000000000D50000-0x0000000000D6A000-memory.dmp family_purelog_stealer -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation IMG79600253.exe -
Executes dropped EXE 1 IoCs
pid Process 4692 Mrmjzj.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uvef = "C:\\Users\\Admin\\AppData\\Roaming\\uvef.exe" IMG79600253.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uvef = "C:\\Users\\Admin\\AppData\\Roaming\\uvef.exe" Mrmjzj.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3508 set thread context of 2652 3508 IMG79600253.exe 92 PID 4692 set thread context of 2560 4692 Mrmjzj.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4080 2652 WerFault.exe 92 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2560 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3508 IMG79600253.exe Token: SeDebugPrivilege 3508 IMG79600253.exe Token: SeDebugPrivilege 4692 Mrmjzj.exe Token: SeDebugPrivilege 4692 Mrmjzj.exe Token: SeDebugPrivilege 2560 RegAsm.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3508 wrote to memory of 4692 3508 IMG79600253.exe 91 PID 3508 wrote to memory of 4692 3508 IMG79600253.exe 91 PID 3508 wrote to memory of 4692 3508 IMG79600253.exe 91 PID 3508 wrote to memory of 2652 3508 IMG79600253.exe 92 PID 3508 wrote to memory of 2652 3508 IMG79600253.exe 92 PID 3508 wrote to memory of 2652 3508 IMG79600253.exe 92 PID 3508 wrote to memory of 2652 3508 IMG79600253.exe 92 PID 3508 wrote to memory of 2652 3508 IMG79600253.exe 92 PID 3508 wrote to memory of 2652 3508 IMG79600253.exe 92 PID 3508 wrote to memory of 2652 3508 IMG79600253.exe 92 PID 3508 wrote to memory of 2652 3508 IMG79600253.exe 92 PID 3508 wrote to memory of 2652 3508 IMG79600253.exe 92 PID 4692 wrote to memory of 2560 4692 Mrmjzj.exe 101 PID 4692 wrote to memory of 2560 4692 Mrmjzj.exe 101 PID 4692 wrote to memory of 2560 4692 Mrmjzj.exe 101 PID 4692 wrote to memory of 2560 4692 Mrmjzj.exe 101 PID 4692 wrote to memory of 2560 4692 Mrmjzj.exe 101 PID 4692 wrote to memory of 2560 4692 Mrmjzj.exe 101 PID 4692 wrote to memory of 2560 4692 Mrmjzj.exe 101 PID 4692 wrote to memory of 2560 4692 Mrmjzj.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG79600253.exe"C:\Users\Admin\AppData\Local\Temp\IMG79600253.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\Mrmjzj.exe"C:\Users\Admin\AppData\Local\Temp\Mrmjzj.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 5723⤵
- Program crash
PID:4080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2652 -ip 26521⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD593e85d15ef93ddf8ac964f84d9bec664
SHA1e3d58cca51afd2449a11a8a18c5a0f871dbca59c
SHA256816bb9cdaa18ffba5dbcedf69298718caac8a4ff6c674300a9299d0584a236c9
SHA512acd703192f69af97cd6d288ad43b3b6dc6e711c7747f25af05a0f0fe3619b5c503857d0f6dbe93b4d5dd411b8f0a51cf25b8596396c756cf7f3faed57b00c49c
-
Filesize
93KB
MD579fefc82f4031ede1780a7f28f9321be
SHA1b418bdb6987a028736cf5af5be26f00c62a9a2b3
SHA256c6b24c286af025d86df4b6d5dce48a6a4308cb5316633c6ae60a7cf8139e4f52
SHA512f1ff69ea03f8e845c27c59f05a991d61c9b5399477ab334152bd0f7aa948655ecd767f915dce3fa31f81fcba8e84b0468c99f57250ec442cfde063719b67c20a