Analysis

  • max time kernel
    136s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2023 01:26

General

  • Target

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe

  • Size

    3.6MB

  • MD5

    36fd273ea7607d3a203f257f4e2649ed

  • SHA1

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48

  • SHA256

    471d501162e2a5cb6aab3f4f5362ff843d05ef9f20d9fd7ea29733d3a9875747

  • SHA512

    cf81163bc6d1f1141130fbe70944387b97d322afe837ad21a88a0be8f9fd87615bd7022cc572b1783871cc99f224258bae75855e805c733793b723ba0483597d

  • SSDEEP

    98304:VQF9SqUKUehGS26Ish7MUTjA+1VFnqWXvqaY4:VSSzMGS26x1MUTM+/Fh

Malware Config

Signatures

  • Detect PureCrypter injector 1 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe
    "C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
        "C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:724
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:112
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:960
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
            5⤵
              PID:528
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:1620
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:1952
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:1360
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:972
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:1388
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:1640
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:904
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:1012
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:1540
          • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
            4⤵
            • Executes dropped EXE
            PID:1380

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe

      Filesize

      365.5MB

      MD5

      ba50f2bca86ba947a8d2035bb9b35123

      SHA1

      a542b5c5d41174dc2475a219978123b7d14f958f

      SHA256

      17790c5c071280462ed8e617fd2edfff5bf0f40fb9add57f866f058fdbf24cb5

      SHA512

      08fdb619e411247c571710bc47df2463c95dc2fee82025e548b65ff1a3e4a53e663fafec9bcc5cc234f32211b25f6f9472786c1be543eb71629f32ec09f04379

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe

      Filesize

      365.5MB

      MD5

      ba50f2bca86ba947a8d2035bb9b35123

      SHA1

      a542b5c5d41174dc2475a219978123b7d14f958f

      SHA256

      17790c5c071280462ed8e617fd2edfff5bf0f40fb9add57f866f058fdbf24cb5

      SHA512

      08fdb619e411247c571710bc47df2463c95dc2fee82025e548b65ff1a3e4a53e663fafec9bcc5cc234f32211b25f6f9472786c1be543eb71629f32ec09f04379

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      4686a252805124965b75eba4d4e15210

      SHA1

      067cf7b712e18ff9094b8226970a0e4562a0e250

      SHA256

      63c8a0b8717ab4e8d476916c7f46a8ad4f8e07c53904bb886c761ba6eb8b2644

      SHA512

      c392fc36c0c4cf0fc4fd5888c31c062c356aed15a13de6e453d802726b998ed496282e339869588c619ff9b15f441a22a62b6c761b5160eb6115aba8f0435950

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      271.8MB

      MD5

      18e22aeadea7679393d7ca47934dbc1f

      SHA1

      157de2a42aa246c6121a99bbe7b647bce57e62bd

      SHA256

      6fbaa68a70dea811b12b7a39a48ac448b0b1b411695caf032374a3ca5295bca2

      SHA512

      0966e5935bcf9ebcd7781ca72ffe3b3bdad6183ab706c80df35fb3e5ae806f3a9f11963d8f18b7ae9c1f9df58b1401f5e6d5b55b1114c90f454ac0fa0cc8512a

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      272.4MB

      MD5

      ce7eb0848c18744042983bfc281befef

      SHA1

      62b911ee46cce82414d1a45c75797c0e0285ea8f

      SHA256

      7cc172f26e68e8c20d3fb9614a9417a1e026368dd0dd6b9a126bfc4be0bb7e0b

      SHA512

      7a60bfdf2f13ba5fb0a205d31805701cafa8266223db776f223c979565f4ad1da328835ad12f8c913bd37347377a173eac0d552bce0c9094140c687687a98f7d

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      14.5MB

      MD5

      cb3e48319804017f66995bfc8258790e

      SHA1

      2dbae31f0c4100dc63a0ba4384370b148f45c0b0

      SHA256

      1b791fdff482cf73ef9bf6ba2d38398119186991e439c601beb0715275fd84e2

      SHA512

      78897e77be8702387b780d2a29734577917aa7845ca9abf6c94377585913a1bca7baf793389a13c237176a1c67456b9f4daeeeb8612148502a63aaa64d6dbc50

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      15.1MB

      MD5

      da8048957f49c833dd876aa139c8cbbb

      SHA1

      724cb3b8c02cbe9b8ee6f7b9e9831ca70b4af257

      SHA256

      97e8534faa172e7c99292ac3e7a196132e064cdaaa992c6047cc96bbe85b5421

      SHA512

      25f97e39aa092b04820e64d04e39f1a77778e76e644e053f8b8b97ab0c7071b78591b8bd8f12be6d53821f68f364631a7a2cfa3b6ddbe2cde4756d899b36d5a7

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      14.9MB

      MD5

      620bf08b88f11c142b0398a83d45aa91

      SHA1

      c15c8e9513e552535593d2d1f17c3c4f720390df

      SHA256

      2356e07b68c1810b65fc3cba182378f4259f5f86957d0d6a1e82ec573d1cea7d

      SHA512

      31a68006e01feec6e061d8ec1a524ab30350dbc5c97f7765a40e16c49aae61445a16798aef5562d4644ff0bf128ea23551fc844e9860e76d4862f72fd97cdf01

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      14.6MB

      MD5

      e2d80a561896a471d83160856d86bd88

      SHA1

      9d20dcce1ebb49aece3c446c61903f3a4d2fd4ca

      SHA256

      4454c591760290b590315ee2d902f40ce5efaffab62e19031c5e2bb2b203f11e

      SHA512

      d320dc7069aad6b9090bbddde30e77536d87718eb84f339de7eccbc036804ac652c8f0e065f668dffe91adf80557d0ec11b56c84517c860c6874d243101a83b5

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      15.0MB

      MD5

      49cd2d47f46dcc07da8ddc3928c0bf0c

      SHA1

      f924356d821fd324c866813ad1246dfda586d6d1

      SHA256

      17b08ed723f6255965b7383d3a786b522f23939c0e8ab7ff9aceb3aadd8c83f4

      SHA512

      3ee3f734c5f3492b460a98d2f7b34d344859b7db08065386280c4001c358482ebf08f9b9a27b697cd99a3ec9cd7634f2b9cc093141bcf3ae2e8f0d0689e7163c

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      14.6MB

      MD5

      e2d80a561896a471d83160856d86bd88

      SHA1

      9d20dcce1ebb49aece3c446c61903f3a4d2fd4ca

      SHA256

      4454c591760290b590315ee2d902f40ce5efaffab62e19031c5e2bb2b203f11e

      SHA512

      d320dc7069aad6b9090bbddde30e77536d87718eb84f339de7eccbc036804ac652c8f0e065f668dffe91adf80557d0ec11b56c84517c860c6874d243101a83b5

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      14.9MB

      MD5

      620bf08b88f11c142b0398a83d45aa91

      SHA1

      c15c8e9513e552535593d2d1f17c3c4f720390df

      SHA256

      2356e07b68c1810b65fc3cba182378f4259f5f86957d0d6a1e82ec573d1cea7d

      SHA512

      31a68006e01feec6e061d8ec1a524ab30350dbc5c97f7765a40e16c49aae61445a16798aef5562d4644ff0bf128ea23551fc844e9860e76d4862f72fd97cdf01

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      14.6MB

      MD5

      e2d80a561896a471d83160856d86bd88

      SHA1

      9d20dcce1ebb49aece3c446c61903f3a4d2fd4ca

      SHA256

      4454c591760290b590315ee2d902f40ce5efaffab62e19031c5e2bb2b203f11e

      SHA512

      d320dc7069aad6b9090bbddde30e77536d87718eb84f339de7eccbc036804ac652c8f0e065f668dffe91adf80557d0ec11b56c84517c860c6874d243101a83b5

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      11.8MB

      MD5

      dbee078c1ffa6939eb3640b2f4076d8d

      SHA1

      dc91fbcf423c5a8da63f4414395a70170bd11202

      SHA256

      d2633868d1af2bc36cf05a650bc423021207e3c5753b2ffba6242d4922214624

      SHA512

      e524ce7f009c640f66be0873d3de19d7869d49bc0c9546da2bdee248122ed688bc522e08e4dd957c10824fcb1f8004868caaba4e8f855b707342a5c3e607fc15

    • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      15.0MB

      MD5

      49cd2d47f46dcc07da8ddc3928c0bf0c

      SHA1

      f924356d821fd324c866813ad1246dfda586d6d1

      SHA256

      17b08ed723f6255965b7383d3a786b522f23939c0e8ab7ff9aceb3aadd8c83f4

      SHA512

      3ee3f734c5f3492b460a98d2f7b34d344859b7db08065386280c4001c358482ebf08f9b9a27b697cd99a3ec9cd7634f2b9cc093141bcf3ae2e8f0d0689e7163c

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      279.8MB

      MD5

      ebca98e212b8d6b959bc09533bb90300

      SHA1

      e8aefa84532a2c5bdc9badcc56f552391d5820ed

      SHA256

      1076f29537038f156ff4e34e7b41d1f166da37576d626b4b28c3b47c3f9cedac

      SHA512

      188a41775a49de6d10f70739de4b55332191711f71709123e655ccd11022099a5a688e5f7968ca8791ef0da398057de7168b690c2b4cbc4fe8cb2af6157260dc

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      271.5MB

      MD5

      9a8afa4a770c32cfacb1350cec439f59

      SHA1

      e5b15ab5b6c1ebea2bed5902ba3932753e35bf73

      SHA256

      ffe5bfabd3d086312615a695d32b978c766cde1745dde1a5b13c11bdbd3944e9

      SHA512

      ca76d574892aa012f3a850bf4e781c53c25b054106e297b9da61f37a0d1892f15312293e76ef75ef0240f980f6fa0a6301f09b0f5a5c8615ab3d44ba937a46d9

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      256.6MB

      MD5

      7d8b2001d15e33d37a787adfed1a2c10

      SHA1

      488f284d0f521b5ba05eb50e5a6761b21e33b942

      SHA256

      de7fe076db5ceca024ac20db89ee5127e38a08aa61078b8551cc06878d3ea492

      SHA512

      ef53d06d83e68574c7dec955e38e734890f5fe4b0042427cd4d1619e4889e1fbd35a8e46f0acf4bf020165260f575a6897adb8606cc2efd55c132e7e7642c70e

    • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe

      Filesize

      249.8MB

      MD5

      4ae9c3eb26fcb3c00ea5e07279440f61

      SHA1

      6e2ea57e37a67020c3d8bd1635e107d2a9c8852b

      SHA256

      f790663c25f9a138b9372600d67decb8342f857a83e605c8dccac9ba520280af

      SHA512

      c2c374750a2677ffa92b93b497209ae65935200b2d651884c07c828c959c12d8a4a8fc4940aca8b3e5c054ad640479f7c565355bad234571c581f6281e67a9fe

    • memory/112-71-0x000000006FC30000-0x00000000701DB000-memory.dmp

      Filesize

      5.7MB

    • memory/112-70-0x000000006FC30000-0x00000000701DB000-memory.dmp

      Filesize

      5.7MB

    • memory/112-69-0x000000006FC30000-0x00000000701DB000-memory.dmp

      Filesize

      5.7MB

    • memory/112-67-0x0000000000000000-mapping.dmp

    • memory/528-75-0x0000000000000000-mapping.dmp

    • memory/528-87-0x000000006FBE0000-0x000000007018B000-memory.dmp

      Filesize

      5.7MB

    • memory/724-73-0x00000000053D0000-0x0000000005542000-memory.dmp

      Filesize

      1.4MB

    • memory/724-66-0x00000000064B0000-0x0000000006850000-memory.dmp

      Filesize

      3.6MB

    • memory/724-65-0x0000000000080000-0x00000000007F4000-memory.dmp

      Filesize

      7.5MB

    • memory/724-62-0x0000000000000000-mapping.dmp

    • memory/960-72-0x0000000000000000-mapping.dmp

    • memory/1244-54-0x0000000000000000-mapping.dmp

    • memory/1244-56-0x0000000076531000-0x0000000076533000-memory.dmp

      Filesize

      8KB