Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 11:29

General

  • Target

    MT_08312_167027.exe

  • Size

    130KB

  • MD5

    8a82bc638ef7460d3d34eeb197826cb6

  • SHA1

    94b8829259e596f14b6d734701203ece0e0b0cfe

  • SHA256

    537ac001bfa8a1b6f2c7faab2e602493bae7472095af0aa616ddc5891f1d8145

  • SHA512

    a005df3f4cc5ab148278fa46c48161c00bf40625d5416476cd512c8d7fb416b02a56a4bc9b7f82a7f434a8c61ee56676173abe66d6e4971bdbb32628b8b7edb8

  • SSDEEP

    1536:xkzyh9vFEzeAJgZgqA/bnKGU6Lk8u2qHlllllllOdQlwEn+glllllllllllllllB:QynvCeugyqAznKEtYwiVxw5lM

Score
10/10

Malware Config

Signatures

  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MT_08312_167027.exe
    "C:\Users\Admin\AppData\Local\Temp\MT_08312_167027.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2124

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2124-0-0x00000000751EE000-0x00000000751EF000-memory.dmp
    Filesize

    4KB

  • memory/2124-1-0x0000000000330000-0x0000000000356000-memory.dmp
    Filesize

    152KB

  • memory/2124-2-0x00000000751E0000-0x0000000075990000-memory.dmp
    Filesize

    7.7MB

  • memory/2124-3-0x0000000002900000-0x0000000002906000-memory.dmp
    Filesize

    24KB

  • memory/2124-4-0x00000000751EE000-0x00000000751EF000-memory.dmp
    Filesize

    4KB

  • memory/2124-5-0x00000000751E0000-0x0000000075990000-memory.dmp
    Filesize

    7.7MB