Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
purity.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
purity.exe
Resource
win10v2004-20240426-en
General
-
Target
purity.exe
-
Size
914KB
-
MD5
09b4990cfdc4b968b00530f2a27ff82d
-
SHA1
600322619eb375cc09e000222b824ea47b29525e
-
SHA256
e5b2c802fd398dcf09a7ac7242f9a3bdaa2a2d7abf08a3cc597ff0365a1abfbc
-
SHA512
d9d23ba74e7a366e9c7ca1b9164b509715ca043afffa1fac9e16d064effdf3dc69e25e57ab1ad32a52eede770b2126aa32a93d406c28fe7cdadcfc4ab5d085cd
-
SSDEEP
24576:WRC1WFteOptl7do60OegX7AoonjMXnMvQo:91wXdD0Ervonj
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\YKPLOsySIDXUwOKuBMPSGfWM\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\YKPLOsySIDXUwOKuBMPSGfWM" unknowncheatsme.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation purity.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 unknowncheatsme.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\SoftwareDistribution\Download\unknowncheatsme.sys purity.exe File created C:\Windows\SoftwareDistribution\Download\unknowncheatsme.exe purity.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ purity.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2400 unknowncheatsme.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2400 unknowncheatsme.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3788 1780 purity.exe 83 PID 1780 wrote to memory of 3788 1780 purity.exe 83 PID 1780 wrote to memory of 2400 1780 purity.exe 88 PID 1780 wrote to memory of 2400 1780 purity.exe 88 PID 1780 wrote to memory of 4364 1780 purity.exe 90 PID 1780 wrote to memory of 4364 1780 purity.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\purity.exe"C:\Users\Admin\AppData\Local\Temp\purity.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3788
-
-
C:\Windows\SoftwareDistribution\Download\unknowncheatsme.exe"C:\Windows\SoftwareDistribution\Download\unknowncheatsme.exe" C:\Windows\SoftwareDistribution\Download\unknowncheatsme.sys2⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD534cfbe3ff70461820ccc31a1afeec0b3
SHA15d32e91c039c9a6f723ba3c04c1179d02e6a0ce9
SHA2566ebcc6896b243c761da4fc28a26249b0c146ae17aff7697c09bc447008e831df
SHA5121ca4661be645e7e954d89c83f1fd126a5e936533052d4e330c9faccb83bb5942d28265375cee743e468b1625a0c1f10888e7957fe88c718e8501a86a78cdc06e