Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-07-2024 23:28
Behavioral task
behavioral1
Sample
80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe
Resource
win11-20240709-en
General
-
Target
80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe
-
Size
1.0MB
-
MD5
31759297fa8b62fb1cc998c1a229d14d
-
SHA1
6e345255abe76ca34768c514bd4558f301c99a78
-
SHA256
80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff
-
SHA512
62ca2bc18179da07fcb42298f5aa6dc9f31fa4dbaadb97bcd8892220d5584a23ea7ffd339b301cb1a79cfcdb5de2d12bd780556f760f5c66d2f0bec59b633b16
-
SSDEEP
24576:6xo4lc+Bbl93QooSZpg0K1iImadvQVqLySyBnjQV3rITD:+b73nbZNK1inq+w3rIX
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4784-1-0x0000000000DB0000-0x0000000000EBC000-memory.dmp family_purelog_stealer -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exedescription pid process target process PID 4784 set thread context of 4740 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
timeout.execmd.exetimeout.exe80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1344 timeout.exe 1752 timeout.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exedescription pid process Token: SeDebugPrivilege 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe Token: SeDebugPrivilege 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.execmd.execmd.exedescription pid process target process PID 4784 wrote to memory of 3132 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe cmd.exe PID 4784 wrote to memory of 3132 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe cmd.exe PID 4784 wrote to memory of 3132 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe cmd.exe PID 3132 wrote to memory of 1344 3132 cmd.exe timeout.exe PID 3132 wrote to memory of 1344 3132 cmd.exe timeout.exe PID 3132 wrote to memory of 1344 3132 cmd.exe timeout.exe PID 4784 wrote to memory of 2700 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe cmd.exe PID 4784 wrote to memory of 2700 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe cmd.exe PID 4784 wrote to memory of 2700 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe cmd.exe PID 2700 wrote to memory of 1752 2700 cmd.exe timeout.exe PID 2700 wrote to memory of 1752 2700 cmd.exe timeout.exe PID 2700 wrote to memory of 1752 2700 cmd.exe timeout.exe PID 4784 wrote to memory of 4740 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe PID 4784 wrote to memory of 4740 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe PID 4784 wrote to memory of 4740 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe PID 4784 wrote to memory of 4740 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe PID 4784 wrote to memory of 4740 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe PID 4784 wrote to memory of 4740 4784 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe 80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe"C:\Users\Admin\AppData\Local\Temp\80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 102⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 102⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\timeout.exetimeout 103⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1752
-
-
-
C:\Users\Admin\AppData\Local\Temp\80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe"C:\Users\Admin\AppData\Local\Temp\80a4325072a8d0587da28929a497d615433addcab45caf75ac0e75d28b6d0dff.exe"2⤵
- Checks SCSI registry key(s)
PID:4740
-