Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 19:18
Behavioral task
behavioral1
Sample
b71836316f2222c3651e8a99cf6432a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b71836316f2222c3651e8a99cf6432a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b71836316f2222c3651e8a99cf6432a0N.exe
-
Size
1.3MB
-
MD5
b71836316f2222c3651e8a99cf6432a0
-
SHA1
b175856f4556c960dcd75384aa3172c1ac2968ba
-
SHA256
cf39da21fcf7f367eb0df5e02d1f1dc8c88126482199d5db386e78660f1b570a
-
SHA512
b20194b370a2cfdce43d8ef8458c4376691e22523771d52d17ce4112b1e4cfe5a82641767ed204506797165e619a176000fed156565acb753e89cc6f228309ea
-
SSDEEP
24576:JbUfjlJfLcXI86oA+uzJtoehgDvGrtqb5SxYJQ1qm64bX:+fjjzx86v/JtodDvy+SGyqmPX
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
resource yara_rule behavioral1/memory/1712-1-0x0000000000220000-0x0000000000374000-memory.dmp family_purelog_stealer -
Program crash 1 IoCs
pid pid_target Process procid_target 4596 1712 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b71836316f2222c3651e8a99cf6432a0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1712 b71836316f2222c3651e8a99cf6432a0N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1712 b71836316f2222c3651e8a99cf6432a0N.exe Token: SeDebugPrivilege 1712 b71836316f2222c3651e8a99cf6432a0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1712 wrote to memory of 4596 1712 b71836316f2222c3651e8a99cf6432a0N.exe 29 PID 1712 wrote to memory of 4596 1712 b71836316f2222c3651e8a99cf6432a0N.exe 29 PID 1712 wrote to memory of 4596 1712 b71836316f2222c3651e8a99cf6432a0N.exe 29 PID 1712 wrote to memory of 4596 1712 b71836316f2222c3651e8a99cf6432a0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b71836316f2222c3651e8a99cf6432a0N.exe"C:\Users\Admin\AppData\Local\Temp\b71836316f2222c3651e8a99cf6432a0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 7482⤵
- Program crash
PID:4596
-