Analysis

  • max time kernel
    46s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2023 11:22

General

  • Target

    notee.exe

  • Size

    7KB

  • MD5

    d3e184b081ba54e7b5cbd5dc579f4f27

  • SHA1

    b7c61923ed6ac09d1aec3b7ff799548d6b6af1c8

  • SHA256

    902abe7c2f1e7afb139ce47a818b11d9ff9dfe9a46cc9b9afb7d7d53bda6c528

  • SHA512

    a9153828449c0ac2eb0feb465b092168b176f133034732eccfec69d4e0705e8f3acd628314b751ad0eaaff06d0b78784242ecbad1aa26783bb0dba23e95f23ee

  • SSDEEP

    96:Wd7KqtBgjmLYoSrJmAkcPFn9bi/rkA86o00gazFnU:WPwHrJr9nlmAyjbt

Malware Config

Signatures

  • Detect PureCrypter injector 1 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\notee.exe
    "C:\Users\Admin\AppData\Local\Temp\notee.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:852
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:780
    • C:\Users\Admin\AppData\Local\Temp\notee.exe
      C:\Users\Admin\AppData\Local\Temp\notee.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:1888

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b786697bea7080ef60e24966a85ebdee

    SHA1

    8ea8ec25825d21e4e98ca1ce487ddcf19ff23fe8

    SHA256

    2a3828df8279e84da5cba1c4cea82d9277f143b6b7b378051b1219515775e735

    SHA512

    fedb242ecfe0d5253e97e33bb88496c7b8ec48f54a3dfc60f3a6691cd1da1d56010c637f7212734b9a09e48c40722b960536442912f71f75b0f97c6ae71c7de1

  • memory/780-57-0x0000000000000000-mapping.dmp
  • memory/780-59-0x000000006F8F0000-0x000000006FE9B000-memory.dmp
    Filesize

    5.7MB

  • memory/780-60-0x000000006F8F0000-0x000000006FE9B000-memory.dmp
    Filesize

    5.7MB

  • memory/780-61-0x000000006F8F0000-0x000000006FE9B000-memory.dmp
    Filesize

    5.7MB

  • memory/852-55-0x0000000075FF1000-0x0000000075FF3000-memory.dmp
    Filesize

    8KB

  • memory/852-56-0x0000000006750000-0x00000000069D2000-memory.dmp
    Filesize

    2.5MB

  • memory/852-62-0x0000000005040000-0x0000000005094000-memory.dmp
    Filesize

    336KB

  • memory/852-54-0x0000000000B40000-0x0000000000B48000-memory.dmp
    Filesize

    32KB

  • memory/1888-63-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1888-67-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1888-68-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1888-69-0x000000000042A6CE-mapping.dmp
  • memory/1888-71-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1888-73-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1888-66-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/1888-64-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB