Analysis
-
max time kernel
63s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16-02-2023 07:28
Static task
static1
Behavioral task
behavioral1
Sample
b67649a9a69b4891e75746f8ed5ffbec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b67649a9a69b4891e75746f8ed5ffbec.exe
Resource
win10v2004-20220812-en
General
-
Target
b67649a9a69b4891e75746f8ed5ffbec.exe
-
Size
1.5MB
-
MD5
b67649a9a69b4891e75746f8ed5ffbec
-
SHA1
4d59dcf71f149fbd482e045bd58742d8589b7d4b
-
SHA256
9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f
-
SHA512
6edfb13376787e5a2f6fcfc5126421c60080c2504b48cad2b37cde73e441a66462220b6e2ca56e1223c864df0c2011c6244e5139b70744141fc6b59a60771e70
-
SSDEEP
24576:DP/kDXWkQpq97UrOPdDOBeWICivr9kDXWkQpq97UrOPdDOBeWICivp:DUm5pYI6PdDAeTvr2m5pYI6PdDAeTvp
Malware Config
Extracted
purecrypter
http://rssh.li/panel/uploads/Vvfilmvppec.dat
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 820 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1604 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1708 b67649a9a69b4891e75746f8ed5ffbec.exe Token: SeDebugPrivilege 1604 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1708 wrote to memory of 532 1708 b67649a9a69b4891e75746f8ed5ffbec.exe 28 PID 1708 wrote to memory of 532 1708 b67649a9a69b4891e75746f8ed5ffbec.exe 28 PID 1708 wrote to memory of 532 1708 b67649a9a69b4891e75746f8ed5ffbec.exe 28 PID 1708 wrote to memory of 532 1708 b67649a9a69b4891e75746f8ed5ffbec.exe 28 PID 532 wrote to memory of 820 532 cmd.exe 30 PID 532 wrote to memory of 820 532 cmd.exe 30 PID 532 wrote to memory of 820 532 cmd.exe 30 PID 532 wrote to memory of 820 532 cmd.exe 30 PID 1708 wrote to memory of 1604 1708 b67649a9a69b4891e75746f8ed5ffbec.exe 31 PID 1708 wrote to memory of 1604 1708 b67649a9a69b4891e75746f8ed5ffbec.exe 31 PID 1708 wrote to memory of 1604 1708 b67649a9a69b4891e75746f8ed5ffbec.exe 31 PID 1708 wrote to memory of 1604 1708 b67649a9a69b4891e75746f8ed5ffbec.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b67649a9a69b4891e75746f8ed5ffbec.exe"C:\Users\Admin\AppData\Local\Temp\b67649a9a69b4891e75746f8ed5ffbec.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig/release2⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:820
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAyADAA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-