Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-02-2023 10:42
Behavioral task
behavioral1
Sample
164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe
Resource
win10v2004-20221111-en
General
-
Target
164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe
-
Size
6KB
-
MD5
d785e46b0d269b0578dcfd1b90375a6a
-
SHA1
d1c4a196f24f0659c29fb05e99e690c87bf6d673
-
SHA256
164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2
-
SHA512
ea93bf91f0035a2996f227e04ccca718a9a470ca477e2e5af12a5180c70c62d6efcdbfd29d40e0458baa5ebdd525b5281e342ec29d01fc6fc9173a5b625704c3
-
SSDEEP
96:673zsN+JBcMAiLt6NkIJmaI8RP4e/kvHxNezNt:oo+MOLtErRJcvb4
Malware Config
Extracted
purecrypter
http://justnormalsite.ddns.net/SystemEnv/uploads/newsoftware-tester_Ilbiekxz.png
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1656 1516 WerFault.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1516 164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1656 1516 164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe 27 PID 1516 wrote to memory of 1656 1516 164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe 27 PID 1516 wrote to memory of 1656 1516 164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe 27 PID 1516 wrote to memory of 1656 1516 164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe"C:\Users\Admin\AppData\Local\Temp\164df1aecac769eb2d9485abcb776f9ee55fc1e297c5b8b2bc50009e786d41b2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 12282⤵
- Program crash
PID:1656
-