Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-02-2023 08:38
Static task
static1
Behavioral task
behavioral1
Sample
14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe
Resource
win10v2004-20220812-en
General
-
Target
14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe
-
Size
172KB
-
MD5
a9fe419d1a7c914e4bcb26ba2d564338
-
SHA1
287d701de4ece28a6b0245c89b2ea488c6fee16b
-
SHA256
14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb
-
SHA512
5ea544d93d2d19614e006f4b1762cb3e5d886e130c1fe77973cf83f2bac02dd9ea58eea0ac428e08bec65e03f1f37b41da3608f8a817d0a42dab49ee4b9f9cb9
-
SSDEEP
1536:v+ac9URWzKr7PhuuUpV7+5JTiy95UuUCQahsf5mZIWiwwr7QXsouW2ASDDA6rRcS:v+apWaxa7Dy956S2j4xnsvXtPdSaeW
Malware Config
Signatures
-
Detect PureCrypter injector 1 IoCs
resource yara_rule behavioral1/memory/816-55-0x000000001FBA0000-0x000000001FE8A000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\cloudapp = "\"C:\\Users\\Admin\\AppData\\Local\\WinSCP\\cloudapp.exe\"" 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1276 powershell.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe Token: SeDebugPrivilege 1276 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 816 wrote to memory of 1276 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 27 PID 816 wrote to memory of 1276 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 27 PID 816 wrote to memory of 1276 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 27 PID 816 wrote to memory of 1188 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 29 PID 816 wrote to memory of 1188 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 29 PID 816 wrote to memory of 1188 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 29 PID 816 wrote to memory of 772 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 30 PID 816 wrote to memory of 772 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 30 PID 816 wrote to memory of 772 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 30 PID 816 wrote to memory of 1072 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 31 PID 816 wrote to memory of 1072 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 31 PID 816 wrote to memory of 1072 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 31 PID 816 wrote to memory of 392 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 32 PID 816 wrote to memory of 392 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 32 PID 816 wrote to memory of 392 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 32 PID 816 wrote to memory of 276 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 33 PID 816 wrote to memory of 276 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 33 PID 816 wrote to memory of 276 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 33 PID 816 wrote to memory of 868 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 34 PID 816 wrote to memory of 868 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 34 PID 816 wrote to memory of 868 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 34 PID 816 wrote to memory of 324 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 35 PID 816 wrote to memory of 324 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 35 PID 816 wrote to memory of 324 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 35 PID 816 wrote to memory of 792 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 36 PID 816 wrote to memory of 792 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 36 PID 816 wrote to memory of 792 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 36 PID 816 wrote to memory of 1784 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 37 PID 816 wrote to memory of 1784 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 37 PID 816 wrote to memory of 1784 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 37 PID 816 wrote to memory of 1312 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 38 PID 816 wrote to memory of 1312 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 38 PID 816 wrote to memory of 1312 816 14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe"C:\Users\Admin\AppData\Local\Temp\14d6746a7475a0f8cd26d1d30403688e8d36cdc3f093e159f5882dc614a0cccb.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1188
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:772
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1072
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:392
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:276
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:868
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:324
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:792
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1784
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe2⤵PID:1312
-