Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
purity.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
purity.exe
Resource
win10v2004-20240426-en
General
-
Target
purity.exe
-
Size
914KB
-
MD5
09b4990cfdc4b968b00530f2a27ff82d
-
SHA1
600322619eb375cc09e000222b824ea47b29525e
-
SHA256
e5b2c802fd398dcf09a7ac7242f9a3bdaa2a2d7abf08a3cc597ff0365a1abfbc
-
SHA512
d9d23ba74e7a366e9c7ca1b9164b509715ca043afffa1fac9e16d064effdf3dc69e25e57ab1ad32a52eede770b2126aa32a93d406c28fe7cdadcfc4ab5d085cd
-
SSDEEP
24576:WRC1WFteOptl7do60OegX7AoonjMXnMvQo:91wXdD0Ervonj
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ITmVudzANACc\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\ITmVudzANACc" unknowncheatsme.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 unknowncheatsme.exe -
Loads dropped DLL 1 IoCs
pid Process 1972 purity.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SoftwareDistribution\Download\unknowncheatsme.sys purity.exe File created C:\Windows\SoftwareDistribution\Download\unknowncheatsme.exe purity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2904 unknowncheatsme.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2904 unknowncheatsme.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1968 1972 purity.exe 29 PID 1972 wrote to memory of 1968 1972 purity.exe 29 PID 1972 wrote to memory of 1968 1972 purity.exe 29 PID 1972 wrote to memory of 2904 1972 purity.exe 30 PID 1972 wrote to memory of 2904 1972 purity.exe 30 PID 1972 wrote to memory of 2904 1972 purity.exe 30 PID 1972 wrote to memory of 2628 1972 purity.exe 32 PID 1972 wrote to memory of 2628 1972 purity.exe 32 PID 1972 wrote to memory of 2628 1972 purity.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\purity.exe"C:\Users\Admin\AppData\Local\Temp\purity.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1968
-
-
C:\Windows\SoftwareDistribution\Download\unknowncheatsme.exe"C:\Windows\SoftwareDistribution\Download\unknowncheatsme.exe" C:\Windows\SoftwareDistribution\Download\unknowncheatsme.sys2⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD534cfbe3ff70461820ccc31a1afeec0b3
SHA15d32e91c039c9a6f723ba3c04c1179d02e6a0ce9
SHA2566ebcc6896b243c761da4fc28a26249b0c146ae17aff7697c09bc447008e831df
SHA5121ca4661be645e7e954d89c83f1fd126a5e936533052d4e330c9faccb83bb5942d28265375cee743e468b1625a0c1f10888e7957fe88c718e8501a86a78cdc06e