Analysis

  • max time kernel
    52s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-02-2023 01:27

General

  • Target

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe

  • Size

    3.6MB

  • MD5

    36fd273ea7607d3a203f257f4e2649ed

  • SHA1

    5e243f79ecb539d0d1f75fce7ddfedeccee70a48

  • SHA256

    471d501162e2a5cb6aab3f4f5362ff843d05ef9f20d9fd7ea29733d3a9875747

  • SHA512

    cf81163bc6d1f1141130fbe70944387b97d322afe837ad21a88a0be8f9fd87615bd7022cc572b1783871cc99f224258bae75855e805c733793b723ba0483597d

  • SSDEEP

    98304:VQF9SqUKUehGS26Ish7MUTjA+1VFnqWXvqaY4:VSSzMGS26x1MUTM+/Fh

Malware Config

Signatures

  • Detect PureCrypter injector 1 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe
    "C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
        "C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:268
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1244
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1492
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:788
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1064
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1532
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1476
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1904
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1440
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1700
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:1884
        • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
          4⤵
          • Executes dropped EXE
          PID:2044
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1460

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
    Filesize

    124.0MB

    MD5

    e30b3d6396c9ba42f5c5bd1ee5075cfc

    SHA1

    f0ca7c98444ef96991662dafd2679e366dba1cbd

    SHA256

    33345d82e63469aee0aa6cda1525d505893e126c910f0738a1f45b8e18a642bf

    SHA512

    f62571f0ff1f3258fb9239538f1512e3ea2152b807fe1d71cdca5c76ea8f8fceba4124f9c525058b81593b8f4409bede5c1032d812128014bed3268badcf0396

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe
    Filesize

    102.2MB

    MD5

    d99b3a3a6ed107471562ae739a4882fc

    SHA1

    b88e950a78f31f6b739377e6d18a6289e12b7782

    SHA256

    32d361c1f72e52733847c6f4e9befca385199c9d65ed2407c0e6b038c41616ad

    SHA512

    ae8d20325832930bca2992521d861265811b8db60342a89cc0ccb6e1fc91018ec18bd12e9dac7ca5261731412be4a3519e9773172dbc528d3be82721bf7bd0b7

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    Filesize

    7KB

    MD5

    afed4edf9ce2837b0a30ff2b1ee9e6d6

    SHA1

    7e1811643acca0d6a3d370e3ab7aec46bbf35606

    SHA256

    681f7a61872dda3e255711b7f296feecde242b4cfe094a4c0c755a54ab9c767b

    SHA512

    1ba60b8614ef4cec339c1c08520b78959cc590c2dd3fab67944605a87523e31fb6805deba443c8984ab0fd73d30b3007b5f3d7a390254571c619803189360ea6

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    110.7MB

    MD5

    4b4f60d646f6ba1680515fc01116479e

    SHA1

    7d81ecd22684beb53685df0aa4d973a622a8383e

    SHA256

    e5d9ab6983ceaa06701bbb0c1de03e63450fff51e8aead91ca7dba9393e3f40a

    SHA512

    e8cd4498603a41d733fcdd679310393de72aa6377650880b2b66f988781aa02c90da52fe37689874c79f8ad3de46b86c7a8dcc61f3a541c11ae1c984b42a6ad3

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    120.7MB

    MD5

    64e169f85c69532bef73a11b42f16e26

    SHA1

    b10822d91bff5c6087bb73cec7b032d029bfb42d

    SHA256

    7b3f4e8b795437ce7f37b2af176f316bba470cf553d7d7768ea140e277b299b5

    SHA512

    0f0e6cf8d759d043a031edefa335f9599faad27fe6710f405fd2173260813db8d4f497bdcceaa8c555ebe0994531b7a9349d31ae486ed7547086b13a01b63922

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    95.1MB

    MD5

    e0c9b52a943ffeae36e23804962208b6

    SHA1

    fbe44c3e502d5462d79ac29d85acde93c5f661f8

    SHA256

    4d483dede881f40960bf9149fd85085d4b64585877ba1fb88d22bd7d838f1224

    SHA512

    5b01645778972c6dbd8e63b37ca2d954dd2c2be987c418aae312025821709ff387b1128e7230ed768f29502f22d42d4c0d5bff6bd5425b1054269f904373715b

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    96.0MB

    MD5

    c89f61ef560c79f487730c869873c2df

    SHA1

    fb5340d2345a5b452962db8b24b92e640b8fe227

    SHA256

    028675a284d5f151338d08f03d3fb4f933769daf443895539864a7a7714a977c

    SHA512

    080f42a44da808bed6c86245fc083493d63482f8a184a1a1affd8a1938769c286c697023fa9fee02209f2742c25fabae34b1339240dd25e4becea6ea9eac8892

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    97.1MB

    MD5

    820f01c759db2a7965a674e40bebafaa

    SHA1

    68f64b80913a026a973cfcc8d1db2b85aa508789

    SHA256

    8cbc6732c35031613b04a6b0878f75e0931b60a5879f0da85e905fe5d47dd68f

    SHA512

    c592afbea13918d4a06dc6f8e1e556b80f3be07a2a249527bd3fa7716a7d611c41950fdca7303e9c112168f32ca136cecf1b81f9773751526cddd2067e39c770

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    95.2MB

    MD5

    feed46e5718bda6cebe92cab5d3b14d6

    SHA1

    ed24ede1b2e18e6f6de3bd56c7452e5bb4faa103

    SHA256

    731cfce23af057412408427d988e5614ce08c4dcb9c2af43699717511708fa77

    SHA512

    5b2fd67839bc1b5294ddbc3b8326a0f0065140ad6a0ec0e539f9c9035ec490c575d0a7a381ea473d954e2de06f23c6874e7419692f98fdcf41ef75525f6214dc

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    95.4MB

    MD5

    8d57b005fd4fbd1a2d1b8d55e7c667f8

    SHA1

    4d2cf8ff9515fd1f5407d14bcd760ae2643878f0

    SHA256

    13fcbed1e5f2a735af12dad17647397ede92987b3de60c4064ee26972d0ec5e9

    SHA512

    51f056e2003bdd883f081e78ebb691d440ac1250cdb96686dad60a8a57d6692250472711d65ef925f4108e40844526f010ba91f22513634ac30ba72221e3153c

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    95.4MB

    MD5

    fb6a6ee3617bf839c2be44a377982800

    SHA1

    4928ad2f6f112a49144ceebf4a3c09118d7886ce

    SHA256

    6bf445a9b240af7ab784c31f60532c2135bf7f97d98a562f38cd6d63ea2a114e

    SHA512

    1ee34d6992df3622f4014ad0e6ea900f0f85e4beb3b046e1f0dc4a7d28b9f5e5be7a0880ebc1240a82eadf8b7ffd4562801c6c8d7c6ace61f0899957fb9c08f9

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    93.8MB

    MD5

    2324ce56c49e44fbe7b20b2751b573bd

    SHA1

    300db30ddec83b27919fcbf50f66d463f5aae6f4

    SHA256

    9d725b061b47e2449b580b75d98465aa38e40e5e5ac49a3a651e6a8719192e07

    SHA512

    48857b23451bfed38ff717904928fab92cd430caaf2542422bc8c686c7478de37509a07ae99636d296bfde717be3ba6e55424519f7434c99860053f970a1dddf

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    96.8MB

    MD5

    42bd5286c291abea2a71db696863ba78

    SHA1

    bc7dd96cb791106e491a13903539c4fe407cf9f9

    SHA256

    b3788968abcce0407c8689b1e0c3a63fe4911c447eff2c33de9c1ed9f33d2936

    SHA512

    d26f40261ff42e2420235f8e56ed478d1a8846d609163c43d3d5c011cbb4843369e5e098926dad5c338d30383c0ef0b5cc5b7aa4a5092ff45c6ba234da98b2b1

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    95.8MB

    MD5

    cf74b209e06306590cefbcce319343be

    SHA1

    649a9e89728b145af3edf5f66dff7c103a2ce79b

    SHA256

    cca32014803d878ba6cb9b2366bf5f714185583707eb81e4b657440f0057ac82

    SHA512

    9a862440d435e6a5ba1335fbb2baad79464d2c59bc6a2e4f0204c2a1e511bc45bb0cb825474622c5e476c7fa280b6554f38df977d8ae416ae8a828de3bdaf6f4

  • C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    94.2MB

    MD5

    2c0adb2a200b64b693fe3cc93670ac78

    SHA1

    be1efb1f5182361731a078a752222391459e8f0e

    SHA256

    9ab933a368387d52149e706da4ac21aabbf9aed1e5ea187d8bb16f9696aefa7b

    SHA512

    755df3d8012b91f209aa778195ebf6c325982f774e4d0d8a22b28367f2223702677de11de515feb5dcf273a6886385af3bd3dfca108e0b12d51f83cb7a0d75b5

  • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    120.4MB

    MD5

    3082e6b626f34a043d79b0ac638046fa

    SHA1

    6c0fddf273934587d5942a2cdcdf8414955530f4

    SHA256

    b24ad0c437721cf246db4b4377debc160a2eb95bd0d377413ceadbd8eb8bb2af

    SHA512

    c2cbfab4236ec71199b5c3a7eca3f311f859156891c3a9a43b8a1ff73d80ef83ef543a8f78dc6edd23beccf6603f3570ebb07687c3c659bc5b6c05c573ff0a20

  • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    119.8MB

    MD5

    e98be0abd6618fa6cc5ba016e8b5cc45

    SHA1

    e786b0e9df4a1fc18b1af6f90f5768b3937e7c9e

    SHA256

    d451dac59c29286bfd4606f48eef4e3f0ec9336e1da2fc47a1091c5a1c16267e

    SHA512

    41df753ae77b826ec0bcbc4f9e15ca501edf981649e6b0eaec738a70a4b73e07b7df47030dd8f51a31d7459993b0ddaa56f476d32d0028c2800b6878239accc1

  • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    117.8MB

    MD5

    9b3ea0b0058963d5b8c04b3d34e3c74e

    SHA1

    d5afebab287565c44703ea639de3d6c996488766

    SHA256

    06eebfa56cbc87fc41c49e1ca59047389ea7ac422c3d9630e3a67b8196ae74e8

    SHA512

    aebd643749c5cec3d0b18ea5ac49982ad7cdc56c1b225d95947174d602fea5360f7d3c1785f9325626a8aa29d85d8fd9e76b53a6c7ba0c5e0e70ec95bb509bd0

  • \Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe
    Filesize

    117.9MB

    MD5

    9cbac7da56c24a3e6b6787b495e64bc3

    SHA1

    0038eb7d89b78d4a652fda8801b4f58fc849a506

    SHA256

    6404fdb9e4bd7e19f3bcb40f16a0643c78f23b979da033085791e6b4a9dda06c

    SHA512

    8c428552b161801537616362027f09d3abb8454206fac832ee5d8558c78660d796fd2346e18c6690771469a335a7dcaef3d1e4181c5b18bb4c4520d34393eb25

  • memory/268-71-0x000000006F6A0000-0x000000006FC4B000-memory.dmp
    Filesize

    5.7MB

  • memory/268-70-0x000000006F6A0000-0x000000006FC4B000-memory.dmp
    Filesize

    5.7MB

  • memory/268-67-0x0000000000000000-mapping.dmp
  • memory/268-69-0x000000006F6A0000-0x000000006FC4B000-memory.dmp
    Filesize

    5.7MB

  • memory/912-54-0x0000000000000000-mapping.dmp
  • memory/912-56-0x0000000075661000-0x0000000075663000-memory.dmp
    Filesize

    8KB

  • memory/960-66-0x0000000006430000-0x00000000067D0000-memory.dmp
    Filesize

    3.6MB

  • memory/960-65-0x0000000000090000-0x0000000000804000-memory.dmp
    Filesize

    7.5MB

  • memory/960-74-0x0000000005420000-0x0000000005592000-memory.dmp
    Filesize

    1.4MB

  • memory/960-62-0x0000000000000000-mapping.dmp
  • memory/1244-72-0x0000000000000000-mapping.dmp
  • memory/1460-87-0x000000006F8F0000-0x000000006FE9B000-memory.dmp
    Filesize

    5.7MB

  • memory/1460-73-0x0000000000000000-mapping.dmp
  • memory/1460-88-0x000000006F8F0000-0x000000006FE9B000-memory.dmp
    Filesize

    5.7MB