Analysis
-
max time kernel
130s -
max time network
159s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-07-2024 05:41
Behavioral task
behavioral1
Sample
cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe
Resource
win11-20240709-en
General
-
Target
cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe
-
Size
6.3MB
-
MD5
7dd3e725b4b0e2322fa6a087dfbb5a60
-
SHA1
8694f846dcb951fdb2e629a9024255dcf9c34d5f
-
SHA256
cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2
-
SHA512
b47169fc4e69799e551369d4bb5af40815050928d3ff40722c9df984f0fbd23b4a9488af42c8aa53673d32cebbef88a0a453d8b9eba301765c4ce5e15b5deb53
-
SSDEEP
196608:TeKXMpvO+EYWSo9YYv7h1Bf54Gv1IbR3gQ1z:TeIMpvLEDzTd54f/1z
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1428-1-0x0000000000B00000-0x000000000115A000-memory.dmp family_purelog_stealer -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-95457810-830748662-4054918673-1000\Software\Microsoft\Windows\CurrentVersion\Run\cvshost = "C:\\Users\\Admin\\AppData\\Local\\cvshost.exe" cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exedescription pid process target process PID 1428 set thread context of 4100 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
timeout.exeInstallUtil.execac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.execmd.exetimeout.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2240 timeout.exe 4076 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exepid process 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe Token: SeDebugPrivilege 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe Token: SeDebugPrivilege 4100 InstallUtil.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.execmd.execmd.exedescription pid process target process PID 1428 wrote to memory of 3112 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe cmd.exe PID 1428 wrote to memory of 3112 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe cmd.exe PID 1428 wrote to memory of 3112 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe cmd.exe PID 3112 wrote to memory of 2240 3112 cmd.exe timeout.exe PID 3112 wrote to memory of 2240 3112 cmd.exe timeout.exe PID 3112 wrote to memory of 2240 3112 cmd.exe timeout.exe PID 1428 wrote to memory of 1876 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe cmd.exe PID 1428 wrote to memory of 1876 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe cmd.exe PID 1428 wrote to memory of 1876 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe cmd.exe PID 1876 wrote to memory of 4076 1876 cmd.exe timeout.exe PID 1876 wrote to memory of 4076 1876 cmd.exe timeout.exe PID 1876 wrote to memory of 4076 1876 cmd.exe timeout.exe PID 1428 wrote to memory of 4100 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe InstallUtil.exe PID 1428 wrote to memory of 4100 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe InstallUtil.exe PID 1428 wrote to memory of 4100 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe InstallUtil.exe PID 1428 wrote to memory of 4100 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe InstallUtil.exe PID 1428 wrote to memory of 4100 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe InstallUtil.exe PID 1428 wrote to memory of 4100 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe InstallUtil.exe PID 1428 wrote to memory of 4100 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe InstallUtil.exe PID 1428 wrote to memory of 4100 1428 cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe"C:\Users\Admin\AppData\Local\Temp\cac0b5218693311e4bd40e0dfa76a0f080876640a4c992324c6926d70f228db2.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 52⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2240
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 52⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4076
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4100
-