Malware Analysis Report

2025-05-05 23:32

Sample ID 230127-p2ndjsaf72
Target 7034c12131cc2e28fcf9235850a36b08e9983dce
SHA256 f00982603a693995cf32649df28ac390ce839638751f04d11517454466061785
Tags
purecrypter remcos 28282 downloader loader persistence rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f00982603a693995cf32649df28ac390ce839638751f04d11517454466061785

Threat Level: Known bad

The file 7034c12131cc2e28fcf9235850a36b08e9983dce was found to be: Known bad.

Malicious Activity Summary

purecrypter remcos 28282 downloader loader persistence rat

Detect PureCrypter injector

PureCrypter

Remcos

Checks computer location settings

Adds Run key to start application

Suspicious use of SetThreadContext

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-01-27 12:49

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-01-27 12:49

Reported

2023-01-27 12:52

Platform

win7-20220812-en

Max time kernel

150s

Max time network

148s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe"

Signatures

Detect PureCrypter injector

loader
Description Indicator Process Target
N/A N/A N/A N/A

PureCrypter

loader downloader purecrypter

Remcos

rat remcos

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Eesibjdz = "\"C:\\Users\\Admin\\AppData\\Roaming\\Gngrey\\Eesibjdz.exe\"" C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 1728 set thread context of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1728 wrote to memory of 332 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 332 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 332 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 332 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 1728 wrote to memory of 632 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

"C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

Network

Country Destination Domain Proto
N/A 194.180.49.17:80 tcp
N/A 194.180.49.17:80 194.180.49.17 tcp
N/A 194.180.49.17:28282 tcp
N/A 194.180.49.17:28282 tcp
N/A 8.8.8.8:53 geoplugin.net udp
N/A 178.237.33.50:80 geoplugin.net tcp

Files

memory/1728-54-0x0000000000D00000-0x0000000000D08000-memory.dmp

memory/1728-55-0x0000000075DA1000-0x0000000075DA3000-memory.dmp

memory/1728-56-0x0000000006320000-0x00000000065BC000-memory.dmp

memory/332-57-0x0000000000000000-mapping.dmp

memory/332-59-0x000000006EE70000-0x000000006F41B000-memory.dmp

memory/332-60-0x000000006EE70000-0x000000006F41B000-memory.dmp

memory/332-61-0x000000006EE70000-0x000000006F41B000-memory.dmp

memory/1728-62-0x0000000005440000-0x00000000054C0000-memory.dmp

memory/632-63-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-64-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-66-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-68-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-69-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-71-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-70-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-73-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-75-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-76-0x0000000000432C26-mapping.dmp

memory/632-79-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-80-0x0000000000400000-0x000000000047F000-memory.dmp

memory/632-81-0x0000000000400000-0x000000000047F000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-01-27 12:49

Reported

2023-01-27 12:53

Platform

win10v2004-20221111-en

Max time kernel

193s

Max time network

204s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe"

Signatures

Remcos

rat remcos

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eesibjdz = "\"C:\\Users\\Admin\\AppData\\Roaming\\Gngrey\\Eesibjdz.exe\"" C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2892 set thread context of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2892 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 3672 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2892 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2376 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2512 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe
PID 2892 wrote to memory of 2604 N/A C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

"C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

C:\Users\Admin\AppData\Local\Temp\7034c12131cc2e28fcf9235850a36b08e9983dce.exe

Network

Country Destination Domain Proto
N/A 93.184.220.29:80 tcp
N/A 104.80.225.205:443 tcp
N/A 20.189.173.10:443 tcp
N/A 88.221.25.154:80 tcp
N/A 88.221.25.154:80 tcp
N/A 87.248.202.1:80 tcp
N/A 194.180.49.17:80 tcp
N/A 8.8.8.8:53 106.89.54.20.in-addr.arpa udp
N/A 194.180.49.17:80 194.180.49.17 tcp
N/A 194.180.49.17:28282 tcp
N/A 194.180.49.17:28282 tcp
N/A 8.8.8.8:53 geoplugin.net udp
N/A 178.237.33.50:80 geoplugin.net tcp

Files

memory/2892-132-0x00000000000C0000-0x00000000000C8000-memory.dmp

memory/2892-133-0x0000000006300000-0x0000000006322000-memory.dmp

memory/3672-134-0x0000000000000000-mapping.dmp

memory/3672-135-0x0000000002780000-0x00000000027B6000-memory.dmp

memory/3672-136-0x00000000053B0000-0x00000000059D8000-memory.dmp

memory/3672-137-0x0000000005C40000-0x0000000005CA6000-memory.dmp

memory/3672-138-0x0000000005BB0000-0x0000000005C16000-memory.dmp

memory/3672-139-0x00000000060F0000-0x000000000610E000-memory.dmp

memory/3672-140-0x0000000007700000-0x0000000007D7A000-memory.dmp

memory/3672-141-0x00000000065B0000-0x00000000065CA000-memory.dmp

memory/2892-142-0x0000000005980000-0x0000000005A12000-memory.dmp

memory/2892-143-0x00000000070F0000-0x0000000007694000-memory.dmp

memory/2376-144-0x0000000000000000-mapping.dmp

memory/2512-145-0x0000000000000000-mapping.dmp

memory/2604-146-0x0000000000000000-mapping.dmp

memory/2604-147-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2604-148-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2604-149-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2604-150-0x0000000000400000-0x000000000047F000-memory.dmp

memory/2604-151-0x0000000000400000-0x000000000047F000-memory.dmp