Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 04:34

General

  • Target

    Mswgoudnv.exe

  • Size

    924KB

  • MD5

    de64bb0f39113e48a8499d3401461cf8

  • SHA1

    8d78c2d4701e4596e87e3f09adde214a2a2033e8

  • SHA256

    64b58794801f282e92571676e3571afc5c59033c262406bf0d36e1d6ef3cda6a

  • SHA512

    35b7cdcfb866dcdc79be34066a9ad5a8058b80e68925aeb23708606149841022de17e9d205389c13803c01e356174a2f657773df7d53f889e4e1fc1d68074179

  • SSDEEP

    24576:NAHFp2K15zXnjfQb6+jFb5RIAJTOcA4gnPdCPPd7wm:WHf15zM5JbtA4wPdCnd75

Malware Config

Signatures

  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3468
      • C:\Users\Admin\AppData\Local\Temp\Mswgoudnv.exe
        "C:\Users\Admin\AppData\Local\Temp\Mswgoudnv.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2192
      • C:\Users\Admin\AppData\Local\Temp\Mswgoudnv.exe
        "C:\Users\Admin\AppData\Local\Temp\Mswgoudnv.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:5012
      • C:\ProgramData\vvotbj\ijlpk.exe
        "C:\ProgramData\vvotbj\ijlpk.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1764
      • C:\ProgramData\vvotbj\ijlpk.exe
        "C:\ProgramData\vvotbj\ijlpk.exe"
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5880
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4464,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=4480 /prefetch:8
      1⤵
        PID:3696
      • C:\ProgramData\vvotbj\ijlpk.exe
        C:\ProgramData\vvotbj\ijlpk.exe
        1⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1476
      • C:\ProgramData\vvotbj\ijlpk.exe
        C:\ProgramData\vvotbj\ijlpk.exe
        1⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5224

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\vvotbj\ijlpk.exe

        Filesize

        924KB

        MD5

        de64bb0f39113e48a8499d3401461cf8

        SHA1

        8d78c2d4701e4596e87e3f09adde214a2a2033e8

        SHA256

        64b58794801f282e92571676e3571afc5c59033c262406bf0d36e1d6ef3cda6a

        SHA512

        35b7cdcfb866dcdc79be34066a9ad5a8058b80e68925aeb23708606149841022de17e9d205389c13803c01e356174a2f657773df7d53f889e4e1fc1d68074179

      • C:\Windows\Tasks\Test Task17.job

        Filesize

        236B

        MD5

        0122e7dea09dded5fc251dc6c4cd8166

        SHA1

        e23d2569bc6dd3b1527a4d7e45ba4c050786ce8f

        SHA256

        6f9a25e7c7a0fbcd2932da32cc9f9f889745f91d093fcf1329eaf274800d62f7

        SHA512

        6c8b42a84eb942f2a9f2b350abafe5154194d6c0d1ef229d11a72e2f696af49a67662f33c6e937ad34d0e6df82eca0989dc93ce7ec469c7cca8ff1e7bcdfadb8

      • memory/1476-1100-0x000000007487E000-0x000000007487F000-memory.dmp

        Filesize

        4KB

      • memory/1476-1101-0x0000000074870000-0x0000000075020000-memory.dmp

        Filesize

        7.7MB

      • memory/1476-2174-0x0000000074870000-0x0000000075020000-memory.dmp

        Filesize

        7.7MB

      • memory/1476-2190-0x0000000074870000-0x0000000075020000-memory.dmp

        Filesize

        7.7MB

      • memory/1476-2182-0x0000000074870000-0x0000000075020000-memory.dmp

        Filesize

        7.7MB

      • memory/1476-2181-0x000000007487E000-0x000000007487F000-memory.dmp

        Filesize

        4KB

      • memory/1476-2180-0x0000000074870000-0x0000000075020000-memory.dmp

        Filesize

        7.7MB

      • memory/1476-2179-0x0000000074870000-0x0000000075020000-memory.dmp

        Filesize

        7.7MB

      • memory/1476-2178-0x0000000074870000-0x0000000075020000-memory.dmp

        Filesize

        7.7MB

      • memory/1764-2191-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/2192-13-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-62-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-68-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-52-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-50-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-48-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-46-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-44-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-42-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-40-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-36-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-34-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-32-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-26-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-24-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-20-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-16-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-14-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-22-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-10-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-8-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-6-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-5-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-66-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-64-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-18-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-60-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-58-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-56-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-54-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-1077-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2192-1078-0x0000000004F30000-0x0000000004F88000-memory.dmp

        Filesize

        352KB

      • memory/2192-1079-0x0000000004F90000-0x0000000004FDC000-memory.dmp

        Filesize

        304KB

      • memory/2192-1083-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2192-1084-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2192-1085-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2192-28-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-30-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-38-0x0000000004DE0000-0x0000000004EB8000-memory.dmp

        Filesize

        864KB

      • memory/2192-4-0x0000000004DE0000-0x0000000004EBE000-memory.dmp

        Filesize

        888KB

      • memory/2192-3-0x0000000004C10000-0x0000000004CEC000-memory.dmp

        Filesize

        880KB

      • memory/2192-2-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/2192-1-0x0000000000220000-0x000000000030E000-memory.dmp

        Filesize

        952KB

      • memory/2192-0-0x0000000074F0E000-0x0000000074F0F000-memory.dmp

        Filesize

        4KB

      • memory/2192-1086-0x0000000074F0E000-0x0000000074F0F000-memory.dmp

        Filesize

        4KB

      • memory/2192-1087-0x0000000005930000-0x0000000005ED4000-memory.dmp

        Filesize

        5.6MB

      • memory/2192-1088-0x0000000005070000-0x00000000050C4000-memory.dmp

        Filesize

        336KB

      • memory/2192-1096-0x0000000074F00000-0x00000000756B0000-memory.dmp

        Filesize

        7.7MB

      • memory/5012-1094-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB