Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
31-01-2023 13:35
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
6 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
2.7MB
-
MD5
79f47ea1ffef2cbc356aaa87610d9168
-
SHA1
3dfa9f0128fbcb080f2dd22ccd5917d2d57d06be
-
SHA256
3d9599c4660790e2a9ec335ff9384efb10443eae67d22925697fd30d48f87414
-
SHA512
4330bc516693b647da60de7e109d811321e98164362ca495bd0f4402c3f42f7eb1fb265cdae685655b51ef837909c895281587ab4f9af987e9550ab495433cb6
-
SSDEEP
49152:X3VxHbk7Rv6msAP/RpWY23Y7MrKSmSejpe:Hbr/O/BO+SV
Score
10/10
Malware Config
Signatures
-
Detect PureCrypter injector 1 IoCs
resource yara_rule behavioral1/memory/2024-55-0x0000000004B00000-0x0000000004DA6000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 888 powershell.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2024 tmp.exe Token: SeDebugPrivilege 888 powershell.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2024 wrote to memory of 888 2024 tmp.exe 27 PID 2024 wrote to memory of 888 2024 tmp.exe 27 PID 2024 wrote to memory of 888 2024 tmp.exe 27 PID 2024 wrote to memory of 888 2024 tmp.exe 27 PID 2024 wrote to memory of 1580 2024 tmp.exe 29 PID 2024 wrote to memory of 1580 2024 tmp.exe 29 PID 2024 wrote to memory of 1580 2024 tmp.exe 29 PID 2024 wrote to memory of 1580 2024 tmp.exe 29 PID 2024 wrote to memory of 336 2024 tmp.exe 30 PID 2024 wrote to memory of 336 2024 tmp.exe 30 PID 2024 wrote to memory of 336 2024 tmp.exe 30 PID 2024 wrote to memory of 336 2024 tmp.exe 30 PID 2024 wrote to memory of 360 2024 tmp.exe 31 PID 2024 wrote to memory of 360 2024 tmp.exe 31 PID 2024 wrote to memory of 360 2024 tmp.exe 31 PID 2024 wrote to memory of 360 2024 tmp.exe 31 PID 2024 wrote to memory of 1368 2024 tmp.exe 34 PID 2024 wrote to memory of 1368 2024 tmp.exe 34 PID 2024 wrote to memory of 1368 2024 tmp.exe 34 PID 2024 wrote to memory of 1368 2024 tmp.exe 34 PID 2024 wrote to memory of 1816 2024 tmp.exe 32 PID 2024 wrote to memory of 1816 2024 tmp.exe 32 PID 2024 wrote to memory of 1816 2024 tmp.exe 32 PID 2024 wrote to memory of 1816 2024 tmp.exe 32 PID 2024 wrote to memory of 884 2024 tmp.exe 33 PID 2024 wrote to memory of 884 2024 tmp.exe 33 PID 2024 wrote to memory of 884 2024 tmp.exe 33 PID 2024 wrote to memory of 884 2024 tmp.exe 33 PID 2024 wrote to memory of 2040 2024 tmp.exe 35 PID 2024 wrote to memory of 2040 2024 tmp.exe 35 PID 2024 wrote to memory of 2040 2024 tmp.exe 35 PID 2024 wrote to memory of 2040 2024 tmp.exe 35 PID 2024 wrote to memory of 1060 2024 tmp.exe 36 PID 2024 wrote to memory of 1060 2024 tmp.exe 36 PID 2024 wrote to memory of 1060 2024 tmp.exe 36 PID 2024 wrote to memory of 1060 2024 tmp.exe 36 PID 2024 wrote to memory of 1812 2024 tmp.exe 37 PID 2024 wrote to memory of 1812 2024 tmp.exe 37 PID 2024 wrote to memory of 1812 2024 tmp.exe 37 PID 2024 wrote to memory of 1812 2024 tmp.exe 37 PID 2024 wrote to memory of 1544 2024 tmp.exe 38 PID 2024 wrote to memory of 1544 2024 tmp.exe 38 PID 2024 wrote to memory of 1544 2024 tmp.exe 38 PID 2024 wrote to memory of 1544 2024 tmp.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:336
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:360
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:884
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1544
-