Analysis
-
max time kernel
250s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
11/02/2023, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe
Resource
win10v2004-20220812-en
General
-
Target
db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe
-
Size
2.5MB
-
MD5
6c7ce729cc83844a10c51889ece82606
-
SHA1
442a9193aaa7eab23f135743a8a06481bc0bd28d
-
SHA256
db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a
-
SHA512
a2e32664649a271f941b3496193fc7868cbcf47982d5a8ba61d810848140eccf8899e48d6fd8dcdd8c75c26785872463c53937e69f6a67b95515eaac6254189d
-
SSDEEP
49152:hQE4u11qfGaBLe7l/4fWor/Qx8vneNu0cmWUyAV4iybj8hSFvEZ:hQE4u11cGaBK7pQWC/o6neQYWUy64d/
Malware Config
Signatures
-
Detect PureCrypter injector 1 IoCs
resource yara_rule behavioral1/memory/1992-55-0x0000000004B30000-0x0000000004D9E000-memory.dmp family_purecrypter -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\VPNClient\\VPNClient.exe\"," db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1856 powershell.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe Token: SeDebugPrivilege 1856 powershell.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1856 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 28 PID 1992 wrote to memory of 1856 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 28 PID 1992 wrote to memory of 1856 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 28 PID 1992 wrote to memory of 1856 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 28 PID 1992 wrote to memory of 828 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 30 PID 1992 wrote to memory of 828 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 30 PID 1992 wrote to memory of 828 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 30 PID 1992 wrote to memory of 828 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 30 PID 1992 wrote to memory of 996 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 31 PID 1992 wrote to memory of 996 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 31 PID 1992 wrote to memory of 996 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 31 PID 1992 wrote to memory of 996 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 31 PID 1992 wrote to memory of 1056 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 32 PID 1992 wrote to memory of 1056 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 32 PID 1992 wrote to memory of 1056 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 32 PID 1992 wrote to memory of 1056 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 32 PID 1992 wrote to memory of 1704 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 33 PID 1992 wrote to memory of 1704 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 33 PID 1992 wrote to memory of 1704 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 33 PID 1992 wrote to memory of 1704 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 33 PID 1992 wrote to memory of 304 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 34 PID 1992 wrote to memory of 304 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 34 PID 1992 wrote to memory of 304 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 34 PID 1992 wrote to memory of 304 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 34 PID 1992 wrote to memory of 632 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 35 PID 1992 wrote to memory of 632 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 35 PID 1992 wrote to memory of 632 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 35 PID 1992 wrote to memory of 632 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 35 PID 1992 wrote to memory of 1372 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 36 PID 1992 wrote to memory of 1372 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 36 PID 1992 wrote to memory of 1372 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 36 PID 1992 wrote to memory of 1372 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 36 PID 1992 wrote to memory of 1812 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 37 PID 1992 wrote to memory of 1812 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 37 PID 1992 wrote to memory of 1812 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 37 PID 1992 wrote to memory of 1812 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 37 PID 1992 wrote to memory of 1948 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 38 PID 1992 wrote to memory of 1948 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 38 PID 1992 wrote to memory of 1948 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 38 PID 1992 wrote to memory of 1948 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 38 PID 1992 wrote to memory of 1276 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 39 PID 1992 wrote to memory of 1276 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 39 PID 1992 wrote to memory of 1276 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 39 PID 1992 wrote to memory of 1276 1992 db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe"C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:828
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:996
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:1704
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exeC:\Users\Admin\AppData\Local\Temp\db2ec1bb47040a7f2cfb210fbf58409339f923185c1eb7bb4b97e19fdf3f1f6a.exe2⤵PID:1276
-