Analysis
-
max time kernel
25s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-02-2023 19:10
Static task
static1
Behavioral task
behavioral1
Sample
Os_Editorx64_win7-8-10-11.exe
Resource
win7-20221111-en
General
-
Target
Os_Editorx64_win7-8-10-11.exe
-
Size
319.0MB
-
MD5
cfc67715228aeff0bb92357d11bc3ce7
-
SHA1
f8b664c669dcf720a33630462c6eaad31c415fd4
-
SHA256
48a2f6dab127b5f79ca8293a19f14ffafabd0491e4a570b94b8a52807af5bcb2
-
SHA512
cc21566a400002c6746c4519bae1a54def69bfbbf290bacee783b8c28687ba09973bd5c0063694b02df152a392b6273d243760397796a74b6ce33c8b4593f796
-
SSDEEP
49152:QHuWBLVl5J4EUknv4QjU/5f5gB0dDKoXQo5xbhsJ8klAKjJWWnwn87fHhTjUNjHZ:QOUggv4QjsLzVKop85doKS87K5
Malware Config
Extracted
vidar
2.2
837
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
-
profile_id
837
Signatures
-
Detect PureCrypter injector 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2012-56-0x0000000004D80000-0x0000000005006000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Os_Editorx64_win7-8-10-11.exedescription pid process target process PID 2012 set thread context of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Os_Editorx64_win7-8-10-11.exedescription pid process Token: SeDebugPrivilege 2012 Os_Editorx64_win7-8-10-11.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Os_Editorx64_win7-8-10-11.exedescription pid process target process PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe PID 2012 wrote to memory of 908 2012 Os_Editorx64_win7-8-10-11.exe Os_Editorx64_win7-8-10-11.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Os_Editorx64_win7-8-10-11.exe"C:\Users\Admin\AppData\Local\Temp\Os_Editorx64_win7-8-10-11.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Os_Editorx64_win7-8-10-11.exeC:\Users\Admin\AppData\Local\Temp\Os_Editorx64_win7-8-10-11.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/908-68-0x000000000042D1BC-mapping.dmp
-
memory/908-58-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/908-59-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/908-61-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/908-63-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/908-65-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/908-67-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/908-70-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/908-71-0x0000000000400000-0x000000000046A000-memory.dmpFilesize
424KB
-
memory/2012-55-0x0000000075441000-0x0000000075443000-memory.dmpFilesize
8KB
-
memory/2012-56-0x0000000004D80000-0x0000000005006000-memory.dmpFilesize
2.5MB
-
memory/2012-57-0x0000000005220000-0x000000000528A000-memory.dmpFilesize
424KB
-
memory/2012-54-0x0000000000A90000-0x0000000000D30000-memory.dmpFilesize
2.6MB