Analysis
-
max time kernel
111s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 05:27
Behavioral task
behavioral1
Sample
b327cefae6707c649804ba89518e9690N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b327cefae6707c649804ba89518e9690N.exe
Resource
win10v2004-20240802-en
General
-
Target
b327cefae6707c649804ba89518e9690N.exe
-
Size
273KB
-
MD5
b327cefae6707c649804ba89518e9690
-
SHA1
0a9f7bd8b51d61288cf253a186693f38299bbfb5
-
SHA256
2a196a394b6f73d6e9dafe6205c6507802d50d21de2d715ff512c2c2e4b6531c
-
SHA512
670a1a0db9bcac41e3f0d16992a920232d22e69dbadecffc542990550557ec72f0d2100790fdda3c1645bee339f6a0ce79ae0a3fa5ef590eb882279c5dd815a8
-
SSDEEP
3072:MsC1JX9HSPBKYyuXu8Hzj5v5fOj/1tleVKCKxLD8O:fC/X9yPBFpu8TyxeVKdtD8
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/872-1-0x00000000008E0000-0x0000000000926000-memory.dmp family_purelog_stealer -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation b327cefae6707c649804ba89518e9690N.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation VC_redistx64.exe -
Executes dropped EXE 3 IoCs
pid Process 4328 gWsmPty.exe 404 VC_redistx64.exe 3620 VIZSPLOIT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\My Program = "C:\\ProgramData\\MyHiddenFolder\\VC_redistx64.exe" VC_redistx64.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 404 VC_redistx64.exe 404 VC_redistx64.exe 404 VC_redistx64.exe 404 VC_redistx64.exe 404 VC_redistx64.exe 404 VC_redistx64.exe 404 VC_redistx64.exe 404 VC_redistx64.exe 404 VC_redistx64.exe 404 VC_redistx64.exe 404 VC_redistx64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b327cefae6707c649804ba89518e9690N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redistx64.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe 872 b327cefae6707c649804ba89518e9690N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 872 b327cefae6707c649804ba89518e9690N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 404 VC_redistx64.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 872 wrote to memory of 4328 872 b327cefae6707c649804ba89518e9690N.exe 94 PID 872 wrote to memory of 4328 872 b327cefae6707c649804ba89518e9690N.exe 94 PID 872 wrote to memory of 404 872 b327cefae6707c649804ba89518e9690N.exe 95 PID 872 wrote to memory of 404 872 b327cefae6707c649804ba89518e9690N.exe 95 PID 872 wrote to memory of 404 872 b327cefae6707c649804ba89518e9690N.exe 95 PID 872 wrote to memory of 3620 872 b327cefae6707c649804ba89518e9690N.exe 96 PID 872 wrote to memory of 3620 872 b327cefae6707c649804ba89518e9690N.exe 96 PID 3620 wrote to memory of 3632 3620 VIZSPLOIT.exe 98 PID 3620 wrote to memory of 3632 3620 VIZSPLOIT.exe 98 PID 3632 wrote to memory of 4860 3632 cmd.exe 99 PID 3632 wrote to memory of 4860 3632 cmd.exe 99 PID 3620 wrote to memory of 4752 3620 VIZSPLOIT.exe 100 PID 3620 wrote to memory of 4752 3620 VIZSPLOIT.exe 100 PID 4752 wrote to memory of 3940 4752 cmd.exe 101 PID 4752 wrote to memory of 3940 4752 cmd.exe 101 PID 3620 wrote to memory of 1220 3620 VIZSPLOIT.exe 102 PID 3620 wrote to memory of 1220 3620 VIZSPLOIT.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b327cefae6707c649804ba89518e9690N.exe"C:\Users\Admin\AppData\Local\Temp\b327cefae6707c649804ba89518e9690N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Roaming\gWsmPty.exe"C:\Users\Admin\AppData\Roaming\gWsmPty.exe"2⤵
- Executes dropped EXE
PID:4328
-
-
C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:404
-
-
C:\Users\Admin\AppData\Roaming\VIZSPLOIT.exe"C:\Users\Admin\AppData\Roaming\VIZSPLOIT.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con cols=853⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\system32\mode.commode con cols=854⤵PID:4860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c mode con lines=253⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\system32\mode.commode con lines=254⤵PID:3940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c TITLE Visploit3⤵PID:1220
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5dab13157795e19d8fe050f65ce49401d
SHA1ecb6f0a864fd92fb7c423d882f9a6ea703096318
SHA256d8b4ce77f87bfe0b958f01ea30f48cf53e6ff51b425a57abc4f83a71d47f58fc
SHA5125cdb82bf347dbdae3c8e3f376ad18fb48509af3da91e8d18876ee7adb9db9fa9d2476060bf5de1294d44e86d477486db9efa045bd45a86a0e6739d6cfa9cca89
-
Filesize
194KB
MD51f29ee3673fc717fcb8f6007c3f840cd
SHA15efd71aa728a1699a890e7acbff5f38402b56b4e
SHA2565d8159897acac6a7349dad41208004e071e0ad0388142d81bb4cc72ef459a500
SHA512c1b79a9edfbf8ef9536c28131a9a800cc911ccfb4a7504675566ce9e9bde69965fa4c7e04902f206dfa63c1bb58071809939c8ca3f8ae5adca79ee7d59cab4c3
-
Filesize
13.1MB
MD57f1f6faad0a3366179323f9272ff9770
SHA11fabd1cb6b74980183cf5fb59bd6cf65f4a37234
SHA2569094f28717295369488c86921c6fdfa6e7df38c2915b6811de96212552d66811
SHA512555b15779737f88bf486b58152c57295d1928aae5befad48a04d08a5d56514e891f81f773651d5233cf11605800671885c7475537df1179a2b7ebd0bb949e74a