Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-02-2023 06:43
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
172KB
-
MD5
a9fe419d1a7c914e4bcb26ba2d564338
-
SHA1
287d701de4ece28a6b0245c89b2ea488c6fee16b
-
SHA256
14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb
-
SHA512
5ea544d93d2d19614e006f4b1762cb3e5d886e130c1fe77973cf83f2bac02dd9ea58eea0ac428e08bec65e03f1f37b41da3608f8a817d0a42dab49ee4b9f9cb9
-
SSDEEP
1536:v+ac9URWzKr7PhuuUpV7+5JTiy95UuUCQahsf5mZIWiwwr7QXsouW2ASDDA6rRcS:v+apWaxa7Dy956S2j4xnsvXtPdSaeW
Malware Config
Signatures
-
Detect PureCrypter injector 1 IoCs
resource yara_rule behavioral1/memory/2024-55-0x000000001FAB0000-0x000000001FD9A000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\cloudapp = "\"C:\\Users\\Admin\\AppData\\Local\\WinSCP\\cloudapp.exe\"" tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1668 powershell.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe 2024 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2024 tmp.exe Token: SeDebugPrivilege 1668 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1668 2024 tmp.exe 27 PID 2024 wrote to memory of 1668 2024 tmp.exe 27 PID 2024 wrote to memory of 1668 2024 tmp.exe 27 PID 2024 wrote to memory of 1620 2024 tmp.exe 29 PID 2024 wrote to memory of 1620 2024 tmp.exe 29 PID 2024 wrote to memory of 1620 2024 tmp.exe 29 PID 2024 wrote to memory of 1612 2024 tmp.exe 30 PID 2024 wrote to memory of 1612 2024 tmp.exe 30 PID 2024 wrote to memory of 1612 2024 tmp.exe 30 PID 2024 wrote to memory of 1192 2024 tmp.exe 31 PID 2024 wrote to memory of 1192 2024 tmp.exe 31 PID 2024 wrote to memory of 1192 2024 tmp.exe 31 PID 2024 wrote to memory of 1152 2024 tmp.exe 32 PID 2024 wrote to memory of 1152 2024 tmp.exe 32 PID 2024 wrote to memory of 1152 2024 tmp.exe 32 PID 2024 wrote to memory of 1268 2024 tmp.exe 33 PID 2024 wrote to memory of 1268 2024 tmp.exe 33 PID 2024 wrote to memory of 1268 2024 tmp.exe 33 PID 2024 wrote to memory of 1428 2024 tmp.exe 34 PID 2024 wrote to memory of 1428 2024 tmp.exe 34 PID 2024 wrote to memory of 1428 2024 tmp.exe 34 PID 2024 wrote to memory of 1040 2024 tmp.exe 35 PID 2024 wrote to memory of 1040 2024 tmp.exe 35 PID 2024 wrote to memory of 1040 2024 tmp.exe 35 PID 2024 wrote to memory of 964 2024 tmp.exe 36 PID 2024 wrote to memory of 964 2024 tmp.exe 36 PID 2024 wrote to memory of 964 2024 tmp.exe 36 PID 2024 wrote to memory of 1556 2024 tmp.exe 37 PID 2024 wrote to memory of 1556 2024 tmp.exe 37 PID 2024 wrote to memory of 1556 2024 tmp.exe 37 PID 2024 wrote to memory of 1016 2024 tmp.exe 38 PID 2024 wrote to memory of 1016 2024 tmp.exe 38 PID 2024 wrote to memory of 1016 2024 tmp.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1620
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1612
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1192
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1152
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1268
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1428
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:964
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1556
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1016
-