Analysis
-
max time kernel
106s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 19:18
Behavioral task
behavioral1
Sample
b71836316f2222c3651e8a99cf6432a0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b71836316f2222c3651e8a99cf6432a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
b71836316f2222c3651e8a99cf6432a0N.exe
-
Size
1.3MB
-
MD5
b71836316f2222c3651e8a99cf6432a0
-
SHA1
b175856f4556c960dcd75384aa3172c1ac2968ba
-
SHA256
cf39da21fcf7f367eb0df5e02d1f1dc8c88126482199d5db386e78660f1b570a
-
SHA512
b20194b370a2cfdce43d8ef8458c4376691e22523771d52d17ce4112b1e4cfe5a82641767ed204506797165e619a176000fed156565acb753e89cc6f228309ea
-
SSDEEP
24576:JbUfjlJfLcXI86oA+uzJtoehgDvGrtqb5SxYJQ1qm64bX:+fjjzx86v/JtodDvy+SGyqmPX
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3240-1-0x00000000003E0000-0x0000000000534000-memory.dmp family_purelog_stealer -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
b71836316f2222c3651e8a99cf6432a0N.exedescription pid process target process PID 3240 created 3536 3240 b71836316f2222c3651e8a99cf6432a0N.exe Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b71836316f2222c3651e8a99cf6432a0N.exedescription pid process target process PID 3240 set thread context of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b71836316f2222c3651e8a99cf6432a0N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b71836316f2222c3651e8a99cf6432a0N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b71836316f2222c3651e8a99cf6432a0N.exepid process 3240 b71836316f2222c3651e8a99cf6432a0N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b71836316f2222c3651e8a99cf6432a0N.exedescription pid process Token: SeDebugPrivilege 3240 b71836316f2222c3651e8a99cf6432a0N.exe Token: SeDebugPrivilege 3240 b71836316f2222c3651e8a99cf6432a0N.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
b71836316f2222c3651e8a99cf6432a0N.exedescription pid process target process PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe PID 3240 wrote to memory of 1060 3240 b71836316f2222c3651e8a99cf6432a0N.exe MSBuild.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\b71836316f2222c3651e8a99cf6432a0N.exe"C:\Users\Admin\AppData\Local\Temp\b71836316f2222c3651e8a99cf6432a0N.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3240
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:1060
-