Overview
overview
10Static
static
101060/0763d...ac.exe
windows7-x64
101060/0763d...ac.exe
windows10-2004-x64
101060/2b2bd...38.exe
windows7-x64
11060/2b2bd...38.exe
windows10-2004-x64
81060/2c062...34.exe
windows7-x64
61060/2c062...34.exe
windows10-2004-x64
61060/364fb...ba.exe
windows7-x64
11060/364fb...ba.exe
windows10-2004-x64
11060/a4c4f...4b.exe
windows7-x64
101060/a4c4f...4b.exe
windows10-2004-x64
101060/a50ef...ab.exe
windows7-x64
11060/a50ef...ab.exe
windows10-2004-x64
11060/a5d4b...16.exe
windows7-x64
11060/a5d4b...16.exe
windows10-2004-x64
11060/d71d4...2a.exe
windows7-x64
31060/d71d4...2a.exe
windows10-2004-x64
11060/eb417...9c.exe
windows7-x64
101060/eb417...9c.exe
windows10-2004-x64
10Analysis
-
max time kernel
122s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2023 10:35
Behavioral task
behavioral1
Sample
1060/0763daa2ef0dfb890d90bfd3f21e7a4252fb5c30a51e49904344a36012a79bac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1060/0763daa2ef0dfb890d90bfd3f21e7a4252fb5c30a51e49904344a36012a79bac.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
1060/2b2bd717ef276aa3be519cb31fb4e498bb10242e110892bde18e28174bee5538.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
1060/2b2bd717ef276aa3be519cb31fb4e498bb10242e110892bde18e28174bee5538.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
1060/2c062e6674533b55f8fbcb316674ecd2a1ce8f71dacb55a2cebe248fc7445334.exe
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
1060/2c062e6674533b55f8fbcb316674ecd2a1ce8f71dacb55a2cebe248fc7445334.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
1060/364fb9545112672897e074456abf73a6031b313b2939d8eecec0813a5f096dba.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
1060/364fb9545112672897e074456abf73a6031b313b2939d8eecec0813a5f096dba.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
1060/a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
1060/a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
1060/a50efe1f4ff14d891c56d3d15d60954945d3cfdac28d893ea14806ab17a147ab.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
1060/a50efe1f4ff14d891c56d3d15d60954945d3cfdac28d893ea14806ab17a147ab.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
1060/a5d4bab6184ba63aedcdbcb97666630f2b134de4a39ac0bcbcfe37b7a21b6416.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
1060/a5d4bab6184ba63aedcdbcb97666630f2b134de4a39ac0bcbcfe37b7a21b6416.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
1060/d71d4f7a18e93069f0ad7c6631f49e122710fd4c66e4e91aa8c7c03dd4bc0d2a.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
1060/d71d4f7a18e93069f0ad7c6631f49e122710fd4c66e4e91aa8c7c03dd4bc0d2a.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
1060/eb417ff8f23a6f69a05e39264cccd83c38e44cbdf4e90c5a6455800eb3d9c09c.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
1060/eb417ff8f23a6f69a05e39264cccd83c38e44cbdf4e90c5a6455800eb3d9c09c.exe
Resource
win10v2004-20221111-en
General
-
Target
1060/a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe
-
Size
7KB
-
MD5
bb46f8f73d6e24277069aaab748f15e3
-
SHA1
a6b6111790d9393f897d1cc4de5ec12049a56138
-
SHA256
a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b
-
SHA512
80745f03082df5037368030b538f6a13a742d6bbeef48ab6c11a475ea2a48b244adffad1c13c3291d15744d4c8af3d24b68f0c2c9dcd525f4605d12f2a83f37b
-
SSDEEP
96:nIQcS3gOS1W9TlAORjgLggSOxfIuTOkfKANPkRPKjzNt:nIQl3nngLggSo1OkTMAl
Malware Config
Extracted
purecrypter
https://cdn.discordapp.com/attachments/1048713033821728872/1048726915747418154/Sqteas.png
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exepid process 1628 a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exedescription pid process Token: SeDebugPrivilege 1628 a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1060\a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe"C:\Users\Admin\AppData\Local\Temp\1060\a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628