Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2022, 04:27

General

  • Target

    f7882ab56428fbde316becaebfa0939e.exe

  • Size

    15.1MB

  • MD5

    f7882ab56428fbde316becaebfa0939e

  • SHA1

    579bfdb1f18cdcbb7fcb08d3988bf53dbb1011bb

  • SHA256

    0e75d1b5b9113f26227b5a16dd13b5bcbbb31cddadf7558536227e2599d8e90b

  • SHA512

    cfc33a7edec1eb80d680f3fb3e7d3b187e7eb4401463e24750a597f5d25c29d30bbefaf5338e6c13fa21001796e737c7212c6339eb0d4de149659abb0fe051f6

Malware Config

Signatures

  • Detect PureCrypter loader 2 IoCs
  • PureCrypter

    PureCrypter is a loader which is intended for downloading and executing additional payloads.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\f7882ab56428fbde316becaebfa0939e.exe
      "C:\Users\Admin\AppData\Local\Temp\f7882ab56428fbde316becaebfa0939e.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANAA1AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1696
      • C:\Users\Admin\AppData\Local\Temp\Wuoudwmrceeq.exe
        "C:\Users\Admin\AppData\Local\Temp\Wuoudwmrceeq.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANAA1AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1884
        • C:\Users\Admin\AppData\Local\Temp\Wrxuaatupdate-kmv.exe
          "C:\Users\Admin\AppData\Local\Temp\Wrxuaatupdate-kmv.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1196
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAANAA1AA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1928

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Wrxuaatupdate-kmv.exe

    Filesize

    5.1MB

    MD5

    548b3c083dc843150679970cb38d6144

    SHA1

    a27b8bf86f4d79d4317d0096412ef2cca585e431

    SHA256

    57c94104863dae72ca86c7e0e177b8197b782ce729a1314a7791a4070748a3d5

    SHA512

    4860fc8085aa4663c0ec69648cfe482642403faa30aa0571fc218ebec42b18a40ee9e3e3dbe877d62c8215b82ddb11fd38975e0ad1f7cd3b907b85cc11d36348

  • C:\Users\Admin\AppData\Local\Temp\Wrxuaatupdate-kmv.exe

    Filesize

    5.1MB

    MD5

    548b3c083dc843150679970cb38d6144

    SHA1

    a27b8bf86f4d79d4317d0096412ef2cca585e431

    SHA256

    57c94104863dae72ca86c7e0e177b8197b782ce729a1314a7791a4070748a3d5

    SHA512

    4860fc8085aa4663c0ec69648cfe482642403faa30aa0571fc218ebec42b18a40ee9e3e3dbe877d62c8215b82ddb11fd38975e0ad1f7cd3b907b85cc11d36348

  • C:\Users\Admin\AppData\Local\Temp\Wuoudwmrceeq.exe

    Filesize

    5.1MB

    MD5

    8815a29ce59d4e7ccea1f7a435099d66

    SHA1

    311d2e465af8ca22fde5346b29a01df8a9ed9309

    SHA256

    cb06dd10055a21e1dd9c499ad654da3607907af831a2f2fee6dde45027cbd3de

    SHA512

    26ccf1953ce5582b8f6b396fd53d78f6b52fff45472f0b3efc47d6c95e89355c167cc7eb39861c6233f8e4988271572387cd4299b26521dd675d82c35f646081

  • C:\Users\Admin\AppData\Local\Temp\Wuoudwmrceeq.exe

    Filesize

    5.1MB

    MD5

    8815a29ce59d4e7ccea1f7a435099d66

    SHA1

    311d2e465af8ca22fde5346b29a01df8a9ed9309

    SHA256

    cb06dd10055a21e1dd9c499ad654da3607907af831a2f2fee6dde45027cbd3de

    SHA512

    26ccf1953ce5582b8f6b396fd53d78f6b52fff45472f0b3efc47d6c95e89355c167cc7eb39861c6233f8e4988271572387cd4299b26521dd675d82c35f646081

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    304c2fb56113a020a64a8efe616decc6

    SHA1

    eb8f499cf9ea59ed9ac48c77595b3b169421cbb5

    SHA256

    44f8af7b652bb4cafe0b150db9d3ce388d8c4a9a4625d1604ae3f96281059b44

    SHA512

    a6c2c8056fe1428c5baad531bb0a7ee351e6884513ac2266f435068aafd6f2b61f6771afe68a84083a02f50c55553312e502f457f8cd8f97ecaa45e02244f6ab

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    304c2fb56113a020a64a8efe616decc6

    SHA1

    eb8f499cf9ea59ed9ac48c77595b3b169421cbb5

    SHA256

    44f8af7b652bb4cafe0b150db9d3ce388d8c4a9a4625d1604ae3f96281059b44

    SHA512

    a6c2c8056fe1428c5baad531bb0a7ee351e6884513ac2266f435068aafd6f2b61f6771afe68a84083a02f50c55553312e502f457f8cd8f97ecaa45e02244f6ab

  • \Users\Admin\AppData\Local\Temp\Wrxuaatupdate-kmv.exe

    Filesize

    5.1MB

    MD5

    548b3c083dc843150679970cb38d6144

    SHA1

    a27b8bf86f4d79d4317d0096412ef2cca585e431

    SHA256

    57c94104863dae72ca86c7e0e177b8197b782ce729a1314a7791a4070748a3d5

    SHA512

    4860fc8085aa4663c0ec69648cfe482642403faa30aa0571fc218ebec42b18a40ee9e3e3dbe877d62c8215b82ddb11fd38975e0ad1f7cd3b907b85cc11d36348

  • \Users\Admin\AppData\Local\Temp\Wuoudwmrceeq.exe

    Filesize

    5.1MB

    MD5

    8815a29ce59d4e7ccea1f7a435099d66

    SHA1

    311d2e465af8ca22fde5346b29a01df8a9ed9309

    SHA256

    cb06dd10055a21e1dd9c499ad654da3607907af831a2f2fee6dde45027cbd3de

    SHA512

    26ccf1953ce5582b8f6b396fd53d78f6b52fff45472f0b3efc47d6c95e89355c167cc7eb39861c6233f8e4988271572387cd4299b26521dd675d82c35f646081

  • memory/1028-72-0x00000000771E0000-0x0000000077389000-memory.dmp

    Filesize

    1.7MB

  • memory/1028-71-0x00000000771E0000-0x0000000077389000-memory.dmp

    Filesize

    1.7MB

  • memory/1028-56-0x000000001AEE0000-0x000000001AF72000-memory.dmp

    Filesize

    584KB

  • memory/1028-55-0x0000000020F10000-0x000000002150A000-memory.dmp

    Filesize

    6.0MB

  • memory/1028-54-0x000000013FC40000-0x0000000140B50000-memory.dmp

    Filesize

    15.1MB

  • memory/1028-82-0x00000000771E0000-0x0000000077389000-memory.dmp

    Filesize

    1.7MB

  • memory/1196-100-0x000000001BCA0000-0x000000001BD48000-memory.dmp

    Filesize

    672KB

  • memory/1196-94-0x000000013F210000-0x000000013F720000-memory.dmp

    Filesize

    5.1MB

  • memory/1244-83-0x00000000038F0000-0x000000000397E000-memory.dmp

    Filesize

    568KB

  • memory/1244-84-0x000000001FE60000-0x000000001FF08000-memory.dmp

    Filesize

    672KB

  • memory/1244-88-0x000000001FFAC000-0x000000001FFCB000-memory.dmp

    Filesize

    124KB

  • memory/1244-95-0x000000001FFAC000-0x000000001FFCB000-memory.dmp

    Filesize

    124KB

  • memory/1244-86-0x0000000003AE0000-0x0000000003B2C000-memory.dmp

    Filesize

    304KB

  • memory/1244-85-0x00000000029E0000-0x0000000002A2E000-memory.dmp

    Filesize

    312KB

  • memory/1532-109-0x000000001AB00000-0x000000001AB36000-memory.dmp

    Filesize

    216KB

  • memory/1532-99-0x00000000771E0000-0x0000000077389000-memory.dmp

    Filesize

    1.7MB

  • memory/1532-98-0x000000001AAE0000-0x000000001AB02000-memory.dmp

    Filesize

    136KB

  • memory/1532-97-0x00000000024F0000-0x0000000002517000-memory.dmp

    Filesize

    156KB

  • memory/1532-96-0x00000000771E0000-0x0000000077389000-memory.dmp

    Filesize

    1.7MB

  • memory/1532-110-0x000000001AB30000-0x000000001AB38000-memory.dmp

    Filesize

    32KB

  • memory/1532-70-0x000000013FD20000-0x0000000140230000-memory.dmp

    Filesize

    5.1MB

  • memory/1532-111-0x000000001AF5C000-0x000000001AF7B000-memory.dmp

    Filesize

    124KB

  • memory/1532-74-0x0000000002250000-0x00000000022E2000-memory.dmp

    Filesize

    584KB

  • memory/1532-73-0x000000001F440000-0x000000001F9CC000-memory.dmp

    Filesize

    5.5MB

  • memory/1696-61-0x000000001B770000-0x000000001BA6F000-memory.dmp

    Filesize

    3.0MB

  • memory/1696-58-0x000007FEFBA61000-0x000007FEFBA63000-memory.dmp

    Filesize

    8KB

  • memory/1696-62-0x0000000002764000-0x0000000002767000-memory.dmp

    Filesize

    12KB

  • memory/1696-60-0x000007FEEABC0000-0x000007FEEB71D000-memory.dmp

    Filesize

    11.4MB

  • memory/1696-59-0x000007FEEB720000-0x000007FEEC143000-memory.dmp

    Filesize

    10.1MB

  • memory/1696-63-0x000000000276B000-0x000000000278A000-memory.dmp

    Filesize

    124KB

  • memory/1696-64-0x0000000002764000-0x0000000002767000-memory.dmp

    Filesize

    12KB

  • memory/1696-65-0x000000000276B000-0x000000000278A000-memory.dmp

    Filesize

    124KB

  • memory/1884-87-0x0000000002574000-0x0000000002577000-memory.dmp

    Filesize

    12KB

  • memory/1884-79-0x000007FEEA860000-0x000007FEEB3BD000-memory.dmp

    Filesize

    11.4MB

  • memory/1884-81-0x000000000257B000-0x000000000259A000-memory.dmp

    Filesize

    124KB

  • memory/1884-89-0x000000000257B000-0x000000000259A000-memory.dmp

    Filesize

    124KB

  • memory/1884-78-0x000007FEEB3C0000-0x000007FEEBDE3000-memory.dmp

    Filesize

    10.1MB

  • memory/1884-80-0x0000000002574000-0x0000000002577000-memory.dmp

    Filesize

    12KB

  • memory/1928-106-0x0000000002844000-0x0000000002847000-memory.dmp

    Filesize

    12KB

  • memory/1928-107-0x000000001B7E0000-0x000000001BADF000-memory.dmp

    Filesize

    3.0MB

  • memory/1928-108-0x000000000284B000-0x000000000286A000-memory.dmp

    Filesize

    124KB

  • memory/1928-105-0x000007FEE9EC0000-0x000007FEEAA1D000-memory.dmp

    Filesize

    11.4MB

  • memory/1928-104-0x000007FEEAA20000-0x000007FEEB443000-memory.dmp

    Filesize

    10.1MB

  • memory/1928-112-0x0000000002844000-0x0000000002847000-memory.dmp

    Filesize

    12KB