Analysis

  • max time kernel
    141s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 01:31

General

  • Target

    45458cb19216ce36f2c0391b90bd0e35a74583d0bdfd5a2e48e9e1d625cceba3.exe

  • Size

    2.0MB

  • MD5

    d4f9d1afe2b5bf3633642526c01625d2

  • SHA1

    f553184ae1cf84c9d12ae7ea8262e1cec6442577

  • SHA256

    45458cb19216ce36f2c0391b90bd0e35a74583d0bdfd5a2e48e9e1d625cceba3

  • SHA512

    dcb89b0095fd7ab16ecfd3e4d43d1d6358e612fda3fbdc1cc1dd8d49c69fe60759c20b5f28ec758a6a577626b796f4e2ee66aa7e1f01cfc008c0af6cf52b5c82

  • SSDEEP

    49152:Be7O00O0FTsQTv1YcXKpRaV6NL4ZlEhLHSjqKoe:U7j0OWVTdYcfV6NL4ZlEpyjqKoe

Malware Config

Signatures

  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3504
      • C:\Users\Admin\AppData\Local\Temp\45458cb19216ce36f2c0391b90bd0e35a74583d0bdfd5a2e48e9e1d625cceba3.exe
        "C:\Users\Admin\AppData\Local\Temp\45458cb19216ce36f2c0391b90bd0e35a74583d0bdfd5a2e48e9e1d625cceba3.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2736
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
        2⤵
          PID:4576
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
          2⤵
            PID:4288
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
            2⤵
              PID:4992
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
              2⤵
                PID:2448
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                2⤵
                  PID:5072
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                  2⤵
                    PID:4904
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                    2⤵
                      PID:2948
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                      2⤵
                      • Loads dropped DLL
                      • Accesses Microsoft Outlook profiles
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • outlook_office_path
                      • outlook_win_path
                      PID:2096

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\Costura\AF7011DB9BA75DE3E4434379E8037F31\64\sqlite.interop.dll

                    Filesize

                    1.7MB

                    MD5

                    d3f0fe99d31783cff15c1bae1f89734b

                    SHA1

                    1b706eb0e4bda293dfbb0d08c7a2b652d6ad425b

                    SHA256

                    7b591146c1f26d84b92d6c2113f9bfcf6c9d11728da3baf7973b94db523256e7

                    SHA512

                    737977344ecb252cf86768d14ae4602ab1a24adaa8f61f52beeee25b70d0ad46c834078b46e98aad4e1f9cac54b0754720c5170c4f533b12e96f0b1421727d04

                  • C:\Users\Admin\AppData\Local\Temp\Kjsbo.tmp

                    Filesize

                    124KB

                    MD5

                    9618e15b04a4ddb39ed6c496575f6f95

                    SHA1

                    1c28f8750e5555776b3c80b187c5d15a443a7412

                    SHA256

                    a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                    SHA512

                    f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                  • C:\Users\Admin\AppData\Local\Temp\Nyqiqi.tmp

                    Filesize

                    160KB

                    MD5

                    f310cf1ff562ae14449e0167a3e1fe46

                    SHA1

                    85c58afa9049467031c6c2b17f5c12ca73bb2788

                    SHA256

                    e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                    SHA512

                    1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                  • C:\Users\Admin\AppData\Local\Temp\Wwrlvgjzfsg.tmp

                    Filesize

                    114KB

                    MD5

                    c3311360e96fcf6ea559c40a78ede854

                    SHA1

                    562ada1868020814b25b5dbbdbcb5a9feb9eb6ba

                    SHA256

                    9372c1ee21c8440368f6dd8f6c9aeda24f2067056050fab9d4e050a75437d75b

                    SHA512

                    fef308d10d04d9a3de7db431a9ab4a47dc120bfe0d7ae7db7e151802c426a46b00426b861e7e57ac4d6d21dde6289f278b2dbf903d4d1d6b117e77467ab9cf65

                  • C:\Users\Admin\AppData\Local\Temp\Xiwhrfvhp.tmp

                    Filesize

                    116KB

                    MD5

                    f70aa3fa04f0536280f872ad17973c3d

                    SHA1

                    50a7b889329a92de1b272d0ecf5fce87395d3123

                    SHA256

                    8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                    SHA512

                    30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                  • memory/2096-3951-0x0000018074420000-0x0000018074484000-memory.dmp

                    Filesize

                    400KB

                  • memory/2096-3954-0x0000018074500000-0x0000018074526000-memory.dmp

                    Filesize

                    152KB

                  • memory/2096-3953-0x0000018074540000-0x000001807457A000-memory.dmp

                    Filesize

                    232KB

                  • memory/2096-1092-0x0000018073BC0000-0x0000018073CCE000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2096-3950-0x0000018073470000-0x00000180734EA000-memory.dmp

                    Filesize

                    488KB

                  • memory/2096-4007-0x00007FFB65F50000-0x00007FFB66A11000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2096-3945-0x0000018073FF0000-0x000001807431C000-memory.dmp

                    Filesize

                    3.2MB

                  • memory/2096-3944-0x0000018073DD0000-0x0000018073FE8000-memory.dmp

                    Filesize

                    2.1MB

                  • memory/2096-3943-0x00007FFB65F50000-0x00007FFB66A11000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2096-3942-0x0000018071A30000-0x0000018071ACE000-memory.dmp

                    Filesize

                    632KB

                  • memory/2096-1143-0x00007FFB65F50000-0x00007FFB66A11000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2096-1307-0x00007FFB65F50000-0x00007FFB66A11000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2736-18-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-1079-0x0000017761BD0000-0x0000017761C1C000-memory.dmp

                    Filesize

                    304KB

                  • memory/2736-46-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-42-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-40-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-36-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-34-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-32-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-28-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-26-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-24-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-22-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-20-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-0-0x00007FFB65F53000-0x00007FFB65F55000-memory.dmp

                    Filesize

                    8KB

                  • memory/2736-16-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-14-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-38-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-30-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-12-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-5-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-6-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-1077-0x00007FFB65F50000-0x00007FFB66A11000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2736-1078-0x000001777C120000-0x000001777C24A000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2736-62-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-1083-0x00007FFB65F50000-0x00007FFB66A11000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2736-1084-0x00007FFB65F50000-0x00007FFB66A11000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2736-1085-0x00007FFB65F53000-0x00007FFB65F55000-memory.dmp

                    Filesize

                    8KB

                  • memory/2736-1087-0x000001777BC30000-0x000001777BC84000-memory.dmp

                    Filesize

                    336KB

                  • memory/2736-48-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-1093-0x00007FFB65F50000-0x00007FFB66A11000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2736-52-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-54-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-56-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-58-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-60-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-64-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-67-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-68-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-50-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-44-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-10-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-8-0x000001777BE70000-0x000001777C01A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-4-0x000001777BE70000-0x000001777C020000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-3-0x00007FFB65F50000-0x00007FFB66A11000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2736-2-0x000001777BCC0000-0x000001777BE6E000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/2736-1-0x00000177615D0000-0x00000177617D2000-memory.dmp

                    Filesize

                    2.0MB