Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2023 07:34
Static task
static1
Behavioral task
behavioral1
Sample
9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe
Resource
win10v2004-20221111-en
General
-
Target
9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe
-
Size
1.5MB
-
MD5
b67649a9a69b4891e75746f8ed5ffbec
-
SHA1
4d59dcf71f149fbd482e045bd58742d8589b7d4b
-
SHA256
9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f
-
SHA512
6edfb13376787e5a2f6fcfc5126421c60080c2504b48cad2b37cde73e441a66462220b6e2ca56e1223c864df0c2011c6244e5139b70744141fc6b59a60771e70
-
SSDEEP
24576:DP/kDXWkQpq97UrOPdDOBeWICivr9kDXWkQpq97UrOPdDOBeWICivp:DUm5pYI6PdDAeTvr2m5pYI6PdDAeTvp
Malware Config
Extracted
purecrypter
http://rssh.li/panel/uploads/Vvfilmvppec.dat
Signatures
-
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4460 set thread context of 1312 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4368 ipconfig.exe 3400 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3328 powershell.exe 3328 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe Token: SeDebugPrivilege 3328 powershell.exe Token: SeDebugPrivilege 1312 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4728 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 79 PID 4460 wrote to memory of 4728 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 79 PID 4460 wrote to memory of 4728 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 79 PID 4728 wrote to memory of 4368 4728 cmd.exe 81 PID 4728 wrote to memory of 4368 4728 cmd.exe 81 PID 4728 wrote to memory of 4368 4728 cmd.exe 81 PID 4460 wrote to memory of 3328 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 82 PID 4460 wrote to memory of 3328 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 82 PID 4460 wrote to memory of 3328 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 82 PID 4460 wrote to memory of 1712 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 91 PID 4460 wrote to memory of 1712 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 91 PID 4460 wrote to memory of 1712 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 91 PID 1712 wrote to memory of 3400 1712 cmd.exe 93 PID 1712 wrote to memory of 3400 1712 cmd.exe 93 PID 1712 wrote to memory of 3400 1712 cmd.exe 93 PID 4460 wrote to memory of 1312 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 94 PID 4460 wrote to memory of 1312 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 94 PID 4460 wrote to memory of 1312 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 94 PID 4460 wrote to memory of 1312 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 94 PID 4460 wrote to memory of 1312 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 94 PID 4460 wrote to memory of 1312 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 94 PID 4460 wrote to memory of 1312 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 94 PID 4460 wrote to memory of 1312 4460 9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe"C:\Users\Admin\AppData\Local\Temp\9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig/release2⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:4368
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAyADAA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig/renew2⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:3400
-
-
-
C:\Users\Admin\AppData\Local\Temp\9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exeC:\Users\Admin\AppData\Local\Temp\9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9fbd44c68c8181d842e2553efc72b2f56324d638f56e2581b2db2ce53421d70f.exe.log
Filesize1KB
MD53a9188331a78f1dbce606db64b841fcb
SHA18e2c99b7c477d06591a856a4ea3e1e214719eee8
SHA256db4137e258a0f6159fda559a5f6dd2704be0582c3f0586f65040c7ad1eb68451
SHA512d1a994610a045d89d5d306866c24ae56bf16555414b8f63f632552568e67b5586f26d5a17a1f0a55ada376730298e6d856e9161828d4eae9decfa4e015e0e90a