Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 04:34
Behavioral task
behavioral1
Sample
Mswgoudnv.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Mswgoudnv.exe
Resource
win10v2004-20240802-en
General
-
Target
Mswgoudnv.exe
-
Size
924KB
-
MD5
de64bb0f39113e48a8499d3401461cf8
-
SHA1
8d78c2d4701e4596e87e3f09adde214a2a2033e8
-
SHA256
64b58794801f282e92571676e3571afc5c59033c262406bf0d36e1d6ef3cda6a
-
SHA512
35b7cdcfb866dcdc79be34066a9ad5a8058b80e68925aeb23708606149841022de17e9d205389c13803c01e356174a2f657773df7d53f889e4e1fc1d68074179
-
SSDEEP
24576:NAHFp2K15zXnjfQb6+jFb5RIAJTOcA4gnPdCPPd7wm:WHf15zM5JbtA4wPdCnd75
Malware Config
Signatures
-
PureLog Stealer
PureLog Stealer is an infostealer written in C#.
-
PureLog Stealer payload 2 IoCs
resource yara_rule behavioral2/memory/2192-1-0x0000000000220000-0x000000000030E000-memory.dmp family_purelog_stealer behavioral2/files/0x0008000000023405-1098.dat family_purelog_stealer -
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2192 created 3468 2192 Mswgoudnv.exe 56 PID 1476 created 3468 1476 ijlpk.exe 56 PID 5224 created 3468 5224 ijlpk.exe 56 -
Executes dropped EXE 4 IoCs
pid Process 1476 ijlpk.exe 1764 ijlpk.exe 5224 ijlpk.exe 5880 ijlpk.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\afasdfga = "C:\\Users\\Admin\\AppData\\Roaming\\afasdfga.exe" Mswgoudnv.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2192 set thread context of 5012 2192 Mswgoudnv.exe 107 PID 1476 set thread context of 1764 1476 ijlpk.exe 113 PID 5224 set thread context of 5880 5224 ijlpk.exe 123 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job Mswgoudnv.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mswgoudnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ijlpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ijlpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ijlpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ijlpk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mswgoudnv.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2192 Mswgoudnv.exe 2192 Mswgoudnv.exe 1476 ijlpk.exe 5224 ijlpk.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2192 Mswgoudnv.exe Token: SeDebugPrivilege 2192 Mswgoudnv.exe Token: SeDebugPrivilege 1476 ijlpk.exe Token: SeDebugPrivilege 1476 ijlpk.exe Token: SeDebugPrivilege 5224 ijlpk.exe Token: SeDebugPrivilege 5224 ijlpk.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2192 wrote to memory of 5012 2192 Mswgoudnv.exe 107 PID 2192 wrote to memory of 5012 2192 Mswgoudnv.exe 107 PID 2192 wrote to memory of 5012 2192 Mswgoudnv.exe 107 PID 2192 wrote to memory of 5012 2192 Mswgoudnv.exe 107 PID 2192 wrote to memory of 5012 2192 Mswgoudnv.exe 107 PID 2192 wrote to memory of 5012 2192 Mswgoudnv.exe 107 PID 2192 wrote to memory of 5012 2192 Mswgoudnv.exe 107 PID 2192 wrote to memory of 5012 2192 Mswgoudnv.exe 107 PID 1476 wrote to memory of 1764 1476 ijlpk.exe 113 PID 1476 wrote to memory of 1764 1476 ijlpk.exe 113 PID 1476 wrote to memory of 1764 1476 ijlpk.exe 113 PID 1476 wrote to memory of 1764 1476 ijlpk.exe 113 PID 1476 wrote to memory of 1764 1476 ijlpk.exe 113 PID 1476 wrote to memory of 1764 1476 ijlpk.exe 113 PID 1476 wrote to memory of 1764 1476 ijlpk.exe 113 PID 1476 wrote to memory of 1764 1476 ijlpk.exe 113 PID 5224 wrote to memory of 5880 5224 ijlpk.exe 123 PID 5224 wrote to memory of 5880 5224 ijlpk.exe 123 PID 5224 wrote to memory of 5880 5224 ijlpk.exe 123 PID 5224 wrote to memory of 5880 5224 ijlpk.exe 123 PID 5224 wrote to memory of 5880 5224 ijlpk.exe 123 PID 5224 wrote to memory of 5880 5224 ijlpk.exe 123 PID 5224 wrote to memory of 5880 5224 ijlpk.exe 123 PID 5224 wrote to memory of 5880 5224 ijlpk.exe 123
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\Mswgoudnv.exe"C:\Users\Admin\AppData\Local\Temp\Mswgoudnv.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\Mswgoudnv.exe"C:\Users\Admin\AppData\Local\Temp\Mswgoudnv.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5012
-
-
C:\ProgramData\vvotbj\ijlpk.exe"C:\ProgramData\vvotbj\ijlpk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1764
-
-
C:\ProgramData\vvotbj\ijlpk.exe"C:\ProgramData\vvotbj\ijlpk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4464,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4480 /prefetch:81⤵PID:3696
-
C:\ProgramData\vvotbj\ijlpk.exeC:\ProgramData\vvotbj\ijlpk.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476
-
C:\ProgramData\vvotbj\ijlpk.exeC:\ProgramData\vvotbj\ijlpk.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5de64bb0f39113e48a8499d3401461cf8
SHA18d78c2d4701e4596e87e3f09adde214a2a2033e8
SHA25664b58794801f282e92571676e3571afc5c59033c262406bf0d36e1d6ef3cda6a
SHA51235b7cdcfb866dcdc79be34066a9ad5a8058b80e68925aeb23708606149841022de17e9d205389c13803c01e356174a2f657773df7d53f889e4e1fc1d68074179
-
Filesize
236B
MD50122e7dea09dded5fc251dc6c4cd8166
SHA1e23d2569bc6dd3b1527a4d7e45ba4c050786ce8f
SHA2566f9a25e7c7a0fbcd2932da32cc9f9f889745f91d093fcf1329eaf274800d62f7
SHA5126c8b42a84eb942f2a9f2b350abafe5154194d6c0d1ef229d11a72e2f696af49a67662f33c6e937ad34d0e6df82eca0989dc93ce7ec469c7cca8ff1e7bcdfadb8