Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/01/2023, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
tmp786A.tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp786A.tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp786A.tmp.exe
-
Size
2.7MB
-
MD5
e0a5c7191e00ea683c4e73b1c80b8823
-
SHA1
8349e708101ba87a868fcf7cb4d00b91f1620ff6
-
SHA256
95dd221630d172703a90842a31b0e25a97f98c236e7a4cc09e5dc5862d8d0370
-
SHA512
1f2c10f8205952f613f406d7ea1c4d4bcdf6c71286ca4db859e3a131b4ee30af86f0e35cbcd58e3cd2d8f05a7e4a5be4dede910980b0afbfc44b7fea4d9224fa
-
SSDEEP
49152:QeTuAoMnEHz/oiGhEjE0rzsK+/pWOjrz7Tt5CuU7LHkeimyVfC:Qcu+ozq6sK+sOjrKLH7Z
Malware Config
Signatures
-
Detect PureCrypter injector 1 IoCs
resource yara_rule behavioral1/memory/1972-55-0x0000000004A60000-0x0000000004D14000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gzltzqrlzsv = "\"C:\\Users\\Admin\\AppData\\Roaming\\Quhaolav\\Gzltzqrlzsv.exe\"" tmp786A.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 616 powershell.exe 1972 tmp786A.tmp.exe 1972 tmp786A.tmp.exe 1972 tmp786A.tmp.exe 1972 tmp786A.tmp.exe 1972 tmp786A.tmp.exe 1972 tmp786A.tmp.exe 1972 tmp786A.tmp.exe 1972 tmp786A.tmp.exe 1972 tmp786A.tmp.exe 1972 tmp786A.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1972 tmp786A.tmp.exe Token: SeDebugPrivilege 616 powershell.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1972 wrote to memory of 616 1972 tmp786A.tmp.exe 27 PID 1972 wrote to memory of 616 1972 tmp786A.tmp.exe 27 PID 1972 wrote to memory of 616 1972 tmp786A.tmp.exe 27 PID 1972 wrote to memory of 616 1972 tmp786A.tmp.exe 27 PID 1972 wrote to memory of 556 1972 tmp786A.tmp.exe 30 PID 1972 wrote to memory of 556 1972 tmp786A.tmp.exe 30 PID 1972 wrote to memory of 556 1972 tmp786A.tmp.exe 30 PID 1972 wrote to memory of 556 1972 tmp786A.tmp.exe 30 PID 1972 wrote to memory of 796 1972 tmp786A.tmp.exe 31 PID 1972 wrote to memory of 796 1972 tmp786A.tmp.exe 31 PID 1972 wrote to memory of 796 1972 tmp786A.tmp.exe 31 PID 1972 wrote to memory of 796 1972 tmp786A.tmp.exe 31 PID 1972 wrote to memory of 1064 1972 tmp786A.tmp.exe 32 PID 1972 wrote to memory of 1064 1972 tmp786A.tmp.exe 32 PID 1972 wrote to memory of 1064 1972 tmp786A.tmp.exe 32 PID 1972 wrote to memory of 1064 1972 tmp786A.tmp.exe 32 PID 1972 wrote to memory of 432 1972 tmp786A.tmp.exe 33 PID 1972 wrote to memory of 432 1972 tmp786A.tmp.exe 33 PID 1972 wrote to memory of 432 1972 tmp786A.tmp.exe 33 PID 1972 wrote to memory of 432 1972 tmp786A.tmp.exe 33 PID 1972 wrote to memory of 792 1972 tmp786A.tmp.exe 34 PID 1972 wrote to memory of 792 1972 tmp786A.tmp.exe 34 PID 1972 wrote to memory of 792 1972 tmp786A.tmp.exe 34 PID 1972 wrote to memory of 792 1972 tmp786A.tmp.exe 34 PID 1972 wrote to memory of 1880 1972 tmp786A.tmp.exe 35 PID 1972 wrote to memory of 1880 1972 tmp786A.tmp.exe 35 PID 1972 wrote to memory of 1880 1972 tmp786A.tmp.exe 35 PID 1972 wrote to memory of 1880 1972 tmp786A.tmp.exe 35 PID 1972 wrote to memory of 968 1972 tmp786A.tmp.exe 36 PID 1972 wrote to memory of 968 1972 tmp786A.tmp.exe 36 PID 1972 wrote to memory of 968 1972 tmp786A.tmp.exe 36 PID 1972 wrote to memory of 968 1972 tmp786A.tmp.exe 36 PID 1972 wrote to memory of 1352 1972 tmp786A.tmp.exe 37 PID 1972 wrote to memory of 1352 1972 tmp786A.tmp.exe 37 PID 1972 wrote to memory of 1352 1972 tmp786A.tmp.exe 37 PID 1972 wrote to memory of 1352 1972 tmp786A.tmp.exe 37 PID 1972 wrote to memory of 972 1972 tmp786A.tmp.exe 38 PID 1972 wrote to memory of 972 1972 tmp786A.tmp.exe 38 PID 1972 wrote to memory of 972 1972 tmp786A.tmp.exe 38 PID 1972 wrote to memory of 972 1972 tmp786A.tmp.exe 38 PID 1972 wrote to memory of 1620 1972 tmp786A.tmp.exe 39 PID 1972 wrote to memory of 1620 1972 tmp786A.tmp.exe 39 PID 1972 wrote to memory of 1620 1972 tmp786A.tmp.exe 39 PID 1972 wrote to memory of 1620 1972 tmp786A.tmp.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:556
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:972
-
-
C:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp786A.tmp.exe2⤵PID:1620
-