Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 16:55
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
976KB
-
MD5
902f14b6f32cc40a82d6a0f2c41208ec
-
SHA1
c01e5bc3e9dbb84a5b36841045055999fc0a16cf
-
SHA256
81f91061c650c2d9fdeab6a9d8be220a93d46f930d5c435e4a00c511236a4caa
-
SHA512
d55e184309e122ffbe3097bfb64b3e23829228cd16030dca5856bfa1725bc60c2da04bf04c8919ca658ca4b7b03e4be6e6bc9240b5816903609969213be2f97c
-
SSDEEP
24576:1Ibj07xMVrpydHnnDfiDw8PZIykCu3oxmv2GX:1+ukYxDqnZTlns2
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4124-1-0x00000000008D0000-0x00000000009CA000-memory.dmp family_purelog_stealer C:\ProgramData\uetjsdn\qrtxrt.exe family_purelog_stealer -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
Processes:
file.exeqrtxrt.exeqrtxrt.exedescription pid process target process PID 4124 created 3540 4124 file.exe Explorer.EXE PID 864 created 3540 864 qrtxrt.exe Explorer.EXE PID 1852 created 3540 1852 qrtxrt.exe Explorer.EXE -
Executes dropped EXE 4 IoCs
Processes:
qrtxrt.exeqrtxrt.exeqrtxrt.exeqrtxrt.exepid process 864 qrtxrt.exe 3132 qrtxrt.exe 1852 qrtxrt.exe 1700 qrtxrt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
file.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\afasdfga = "C:\\Users\\Admin\\AppData\\Roaming\\afasdfga.exe" file.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
file.exeqrtxrt.exeqrtxrt.exedescription pid process target process PID 4124 set thread context of 2444 4124 file.exe file.exe PID 864 set thread context of 3132 864 qrtxrt.exe qrtxrt.exe PID 1852 set thread context of 1700 1852 qrtxrt.exe qrtxrt.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc process File created C:\Windows\Tasks\Test Task17.job file.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qrtxrt.exeqrtxrt.exeqrtxrt.exeqrtxrt.exefile.exefile.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrtxrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrtxrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrtxrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qrtxrt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
file.exeqrtxrt.exeqrtxrt.exepid process 4124 file.exe 864 qrtxrt.exe 1852 qrtxrt.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
file.exeqrtxrt.exeqrtxrt.exedescription pid process Token: SeDebugPrivilege 4124 file.exe Token: SeDebugPrivilege 4124 file.exe Token: SeDebugPrivilege 864 qrtxrt.exe Token: SeDebugPrivilege 864 qrtxrt.exe Token: SeDebugPrivilege 1852 qrtxrt.exe Token: SeDebugPrivilege 1852 qrtxrt.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
file.exeqrtxrt.exeqrtxrt.exedescription pid process target process PID 4124 wrote to memory of 2444 4124 file.exe file.exe PID 4124 wrote to memory of 2444 4124 file.exe file.exe PID 4124 wrote to memory of 2444 4124 file.exe file.exe PID 4124 wrote to memory of 2444 4124 file.exe file.exe PID 4124 wrote to memory of 2444 4124 file.exe file.exe PID 4124 wrote to memory of 2444 4124 file.exe file.exe PID 4124 wrote to memory of 2444 4124 file.exe file.exe PID 4124 wrote to memory of 2444 4124 file.exe file.exe PID 864 wrote to memory of 3132 864 qrtxrt.exe qrtxrt.exe PID 864 wrote to memory of 3132 864 qrtxrt.exe qrtxrt.exe PID 864 wrote to memory of 3132 864 qrtxrt.exe qrtxrt.exe PID 864 wrote to memory of 3132 864 qrtxrt.exe qrtxrt.exe PID 864 wrote to memory of 3132 864 qrtxrt.exe qrtxrt.exe PID 864 wrote to memory of 3132 864 qrtxrt.exe qrtxrt.exe PID 864 wrote to memory of 3132 864 qrtxrt.exe qrtxrt.exe PID 864 wrote to memory of 3132 864 qrtxrt.exe qrtxrt.exe PID 1852 wrote to memory of 1700 1852 qrtxrt.exe qrtxrt.exe PID 1852 wrote to memory of 1700 1852 qrtxrt.exe qrtxrt.exe PID 1852 wrote to memory of 1700 1852 qrtxrt.exe qrtxrt.exe PID 1852 wrote to memory of 1700 1852 qrtxrt.exe qrtxrt.exe PID 1852 wrote to memory of 1700 1852 qrtxrt.exe qrtxrt.exe PID 1852 wrote to memory of 1700 1852 qrtxrt.exe qrtxrt.exe PID 1852 wrote to memory of 1700 1852 qrtxrt.exe qrtxrt.exe PID 1852 wrote to memory of 1700 1852 qrtxrt.exe qrtxrt.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\ProgramData\uetjsdn\qrtxrt.exe"C:\ProgramData\uetjsdn\qrtxrt.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3132
-
-
C:\ProgramData\uetjsdn\qrtxrt.exe"C:\ProgramData\uetjsdn\qrtxrt.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\ProgramData\uetjsdn\qrtxrt.exeC:\ProgramData\uetjsdn\qrtxrt.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:864
-
C:\ProgramData\uetjsdn\qrtxrt.exeC:\ProgramData\uetjsdn\qrtxrt.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
976KB
MD5902f14b6f32cc40a82d6a0f2c41208ec
SHA1c01e5bc3e9dbb84a5b36841045055999fc0a16cf
SHA25681f91061c650c2d9fdeab6a9d8be220a93d46f930d5c435e4a00c511236a4caa
SHA512d55e184309e122ffbe3097bfb64b3e23829228cd16030dca5856bfa1725bc60c2da04bf04c8919ca658ca4b7b03e4be6e6bc9240b5816903609969213be2f97c
-
Filesize
240B
MD5827bcbe2efea6d4eafb7264299d86132
SHA1b4a461517f4a0d7fad65d0516d01ae222d052adb
SHA25684d9ac7b204c1e0e786919d2c57febc360271c7b5fc429f3ca1685c1294e2088
SHA5129463716ee5454d670fb2199131e6b743401f51f9c44a1ab9b2a7be4fbf476c140dc636f6a2dc8b46d10286305094bf4184add5657af30c014433281b870886a5