Analysis
-
max time kernel
30s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-02-2023 17:15
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
9 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
6KB
-
MD5
48a13c217c965ed66e5d6c018b89217b
-
SHA1
2d8b62d02c73e7e2fc367fc64b51350564c7acb4
-
SHA256
8650dcaece1489d98b7f6782ae638de33797f2a1018f949ec270054f0893aea0
-
SHA512
b0e5556ad36a74ddfbbbfcd94f04635a614bc70d159aaab8fb540ecd0d823e14c2ed8687b95943cd992b434c37c9bfaa04db79c62f9d654b85616f45d275802a
-
SSDEEP
96:4rs7rOMGPGDupbGL7g8y23I6mUUWH78kVl6l2xzNt:oKrsPGDupKL7nNhVlk2T
Score
10/10
Malware Config
Extracted
Family
purecrypter
C2
https://onedrive.live.com/download?cid=A113DD34A0D77810&resid=A113DD34A0D77810%21121&authkey=APUVM8ZXD6Jpjd0
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1600 1336 WerFault.exe 19 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1336 tmp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1600 1336 tmp.exe 28 PID 1336 wrote to memory of 1600 1336 tmp.exe 28 PID 1336 wrote to memory of 1600 1336 tmp.exe 28 PID 1336 wrote to memory of 1600 1336 tmp.exe 28