Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-02-2023 11:17
Behavioral task
behavioral1
Sample
deliver.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
deliver.exe
Resource
win10v2004-20220812-en
General
-
Target
deliver.exe
-
Size
172KB
-
MD5
6f97a3f9d8c88ac5ba01fccf033a66aa
-
SHA1
5152b20ec9d63e9decb5a17ae652ebd105ce0a24
-
SHA256
1501ed409db46bc33f3f4a13c9d2150308597fb91cff20e04c9df0d5f3dec37d
-
SHA512
a6c3afda108f973a0a4d424db289726c5ee0a46c88030e9354ffa639e81e03a6c4209dbfef4d0c384e919a7a904d4c15feef8e33057017f6a62843362640bdcb
-
SSDEEP
1536:pc9URWzKr7PhuuUpV7+5JTiy95UuUCQahsf5mZIWiwwr7QXsouW2ASDDA6rRcC+R:ppWaxa7Dy956S2j4xnsvXtPdSae1
Malware Config
Extracted
purecrypter
http://163.123.142.210/Twpowpijhqf.dat
Signatures
-
Detect PureCrypter injector 1 IoCs
resource yara_rule behavioral1/memory/2032-56-0x0000000007360000-0x000000000762C000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\exoduswallett = "\"C:\\Users\\Admin\\AppData\\Roaming\\Exodus\\exoduswallett.exe\"" deliver.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 1472 2032 deliver.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2032 deliver.exe Token: SeDebugPrivilege 1736 powershell.exe Token: SeDebugPrivilege 1472 RegAsm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1736 2032 deliver.exe 26 PID 2032 wrote to memory of 1736 2032 deliver.exe 26 PID 2032 wrote to memory of 1736 2032 deliver.exe 26 PID 2032 wrote to memory of 1736 2032 deliver.exe 26 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28 PID 2032 wrote to memory of 1472 2032 deliver.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\deliver.exe"C:\Users\Admin\AppData\Local\Temp\deliver.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1472
-