Analysis

  • max time kernel
    122s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2023 10:35

General

  • Target

    1060/a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe

  • Size

    7KB

  • MD5

    bb46f8f73d6e24277069aaab748f15e3

  • SHA1

    a6b6111790d9393f897d1cc4de5ec12049a56138

  • SHA256

    a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b

  • SHA512

    80745f03082df5037368030b538f6a13a742d6bbeef48ab6c11a475ea2a48b244adffad1c13c3291d15744d4c8af3d24b68f0c2c9dcd525f4605d12f2a83f37b

  • SSDEEP

    96:nIQcS3gOS1W9TlAORjgLggSOxfIuTOkfKANPkRPKjzNt:nIQl3nngLggSo1OkTMAl

Malware Config

Extracted

Family

purecrypter

C2

https://cdn.discordapp.com/attachments/1048713033821728872/1048726915747418154/Sqteas.png

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1060\a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe
    "C:\Users\Admin\AppData\Local\Temp\1060\a4c4feb3d6679413553f96ab310e0a6d62f56a84b252a22d9d406f39cea5ea4b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1628-132-0x0000000000200000-0x0000000000208000-memory.dmp
    Filesize

    32KB

  • memory/1628-133-0x0000000004B70000-0x0000000004BD6000-memory.dmp
    Filesize

    408KB