Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 01:30
Behavioral task
behavioral1
Sample
41bfcac136ff8f5d232419298ec7b6e0N.exe
Resource
win7-20240704-en
windows7-x64
5 signatures
120 seconds
Behavioral task
behavioral2
Sample
41bfcac136ff8f5d232419298ec7b6e0N.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
5 signatures
120 seconds
General
-
Target
41bfcac136ff8f5d232419298ec7b6e0N.exe
-
Size
2.5MB
-
MD5
41bfcac136ff8f5d232419298ec7b6e0
-
SHA1
ced165b12d38356915b64a083ec6c88633572c96
-
SHA256
19c9916b59cb8573f64f15a1fa11e1704d24539cddad2559579ec4aff203c46c
-
SHA512
5f8383fe13d662500dd44565821ac5299b4aaa23e864010f451db04130ce91d2fb1ebe652887abb04be98729cdb05b1f352e39a6de1d3479b46a4194dc900e5b
-
SSDEEP
49152:R5HDi1U52tdpGLi83D26M0Mn4QpcGvM0JZ4DKYW/IVStzY4cU+rb:fHDi1U52tdbCD60wp5E0JZ/7Aoz5w
Score
10/10
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2060-1-0x0000000000E30000-0x00000000010B6000-memory.dmp family_purelog_stealer -
Suspicious use of SetThreadContext 1 IoCs
Processes:
41bfcac136ff8f5d232419298ec7b6e0N.exedescription pid process target process PID 2060 set thread context of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
41bfcac136ff8f5d232419298ec7b6e0N.exe41bfcac136ff8f5d232419298ec7b6e0N.exedescription pid process Token: SeDebugPrivilege 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeDebugPrivilege 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeDebugPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeSecurityPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe Token: SeBackupPrivilege 2136 41bfcac136ff8f5d232419298ec7b6e0N.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
41bfcac136ff8f5d232419298ec7b6e0N.exedescription pid process target process PID 2060 wrote to memory of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe PID 2060 wrote to memory of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe PID 2060 wrote to memory of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe PID 2060 wrote to memory of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe PID 2060 wrote to memory of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe PID 2060 wrote to memory of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe PID 2060 wrote to memory of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe PID 2060 wrote to memory of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe PID 2060 wrote to memory of 2136 2060 41bfcac136ff8f5d232419298ec7b6e0N.exe 41bfcac136ff8f5d232419298ec7b6e0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41bfcac136ff8f5d232419298ec7b6e0N.exe"C:\Users\Admin\AppData\Local\Temp\41bfcac136ff8f5d232419298ec7b6e0N.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\41bfcac136ff8f5d232419298ec7b6e0N.exe"C:\Users\Admin\AppData\Local\Temp\41bfcac136ff8f5d232419298ec7b6e0N.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2136
-