Analysis

  • max time kernel
    82s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2023 12:07

General

  • Target

    e18cf6502122b168dac6c932cd89739e313154ee9b73d6ddd692d4ad990aceb0.exe

  • Size

    25KB

  • MD5

    30b5426ee9183f43fba9a8a6b6b32b97

  • SHA1

    d0b8cde6d8c38e294ce6275b0f935677b07d2202

  • SHA256

    e18cf6502122b168dac6c932cd89739e313154ee9b73d6ddd692d4ad990aceb0

  • SHA512

    adef79c0748b1e8c274f93879c1c068e0d54b88de94fbb01d4d51bd222a6493f8d2cc68f53adab5407bd59249dfa2fdbc8f511bbec3613772591b0ea4d79afaf

  • SSDEEP

    96:jFQgbeIBVLyrgoJ/sTfNILBevmXR5MMRWnwLoLEk8LfjNiRB4e3T3ew5tvEzNt:jFhyIaUo/sTfNILwEfdRTLat8LLGTvu

Malware Config

Extracted

Family

purecrypter

C2

http://argentum.com.br/well-known/acme-challenge/k/h/d/g/Pjogwzrhh.bmp

http://argentum.com.br/well-known/acme-challenge/k/h/d/g/Xzcrd.png

Signatures

  • Detects Smokeloader packer 3 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e18cf6502122b168dac6c932cd89739e313154ee9b73d6ddd692d4ad990aceb0.exe
    "C:\Users\Admin\AppData\Local\Temp\e18cf6502122b168dac6c932cd89739e313154ee9b73d6ddd692d4ad990aceb0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4568
    • C:\Users\Admin\AppData\Local\Temp\e18cf6502122b168dac6c932cd89739e313154ee9b73d6ddd692d4ad990aceb0.exe
      C:\Users\Admin\AppData\Local\Temp\e18cf6502122b168dac6c932cd89739e313154ee9b73d6ddd692d4ad990aceb0.exe
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:828
  • C:\Users\Admin\AppData\Local\Temp\BECC.exe
    C:\Users\Admin\AppData\Local\Temp\BECC.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2272
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Accesses Microsoft Outlook profiles
    • outlook_office_path
    • outlook_win_path
    PID:1284
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe
    1⤵
      PID:492
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:916
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:1400
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:1184
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:1812

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

              Filesize

              1KB

              MD5

              4280e36a29fa31c01e4d8b2ba726a0d8

              SHA1

              c485c2c9ce0a99747b18d899b71dfa9a64dabe32

              SHA256

              e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

              SHA512

              494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

              Filesize

              53KB

              MD5

              06ad34f9739c5159b4d92d702545bd49

              SHA1

              9152a0d4f153f3f40f7e606be75f81b582ee0c17

              SHA256

              474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

              SHA512

              c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              16KB

              MD5

              4ad4a7346a98651c6e7378e1d32f0722

              SHA1

              5ea0f55c35053dddab9d61caabbc4df71a4caf9f

              SHA256

              622f24402e12c24df9936ac49e78878b2f0bb08f1af3ab869e01d7c1e85aae50

              SHA512

              f1b8eab857b5d5a1a30a295a84c2e913ef7c043b253f8968505463f3534eb03e4b890105afaabf677e8641d6b7cda0480d4cb16d4d6779255f98c5507e2ad8ea

            • C:\Users\Admin\AppData\Local\Temp\BECC.exe

              Filesize

              25KB

              MD5

              378afc012094817b26459db696071baa

              SHA1

              e498fbb56ca9cbba1dc4ffea0840fcefe5a5a951

              SHA256

              d8ae15697fbd126606cd0e6e38ad4859667feca010786ae9fffef56c948a7ea3

              SHA512

              79c76d7ca2762460c7d338cfc92ffac56103795a262e04ab3c8ef8db1d33065b79508a003715c1435160fa6044170bfe8d7f459e687871ba386998dd88363828

            • C:\Users\Admin\AppData\Local\Temp\BECC.exe

              Filesize

              25KB

              MD5

              378afc012094817b26459db696071baa

              SHA1

              e498fbb56ca9cbba1dc4ffea0840fcefe5a5a951

              SHA256

              d8ae15697fbd126606cd0e6e38ad4859667feca010786ae9fffef56c948a7ea3

              SHA512

              79c76d7ca2762460c7d338cfc92ffac56103795a262e04ab3c8ef8db1d33065b79508a003715c1435160fa6044170bfe8d7f459e687871ba386998dd88363828

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bngrlzt1.2eg.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • memory/492-189-0x0000000000100000-0x000000000010C000-memory.dmp

              Filesize

              48KB

            • memory/492-188-0x0000000000100000-0x000000000010C000-memory.dmp

              Filesize

              48KB

            • memory/828-162-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/828-166-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/828-164-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/916-207-0x0000000000A30000-0x0000000000A9B000-memory.dmp

              Filesize

              428KB

            • memory/916-208-0x0000000000E00000-0x0000000000E0B000-memory.dmp

              Filesize

              44KB

            • memory/916-206-0x0000000000E00000-0x0000000000E0B000-memory.dmp

              Filesize

              44KB

            • memory/1184-227-0x00000000005B0000-0x00000000005B9000-memory.dmp

              Filesize

              36KB

            • memory/1184-226-0x0000000004C70000-0x0000000004C80000-memory.dmp

              Filesize

              64KB

            • memory/1184-225-0x00000000005B0000-0x00000000005B9000-memory.dmp

              Filesize

              36KB

            • memory/1284-184-0x0000000000A30000-0x0000000000A9B000-memory.dmp

              Filesize

              428KB

            • memory/1284-181-0x0000000000A30000-0x0000000000A9B000-memory.dmp

              Filesize

              428KB

            • memory/1284-183-0x0000000000AA0000-0x0000000000B20000-memory.dmp

              Filesize

              512KB

            • memory/1284-205-0x0000000000A30000-0x0000000000A9B000-memory.dmp

              Filesize

              428KB

            • memory/1400-223-0x00000000012E0000-0x00000000012EF000-memory.dmp

              Filesize

              60KB

            • memory/1400-210-0x00000000012E0000-0x00000000012EF000-memory.dmp

              Filesize

              60KB

            • memory/1400-222-0x0000000004C70000-0x0000000004C80000-memory.dmp

              Filesize

              64KB

            • memory/1812-228-0x00000000010A0000-0x00000000010AC000-memory.dmp

              Filesize

              48KB

            • memory/1812-229-0x00000000010A0000-0x00000000010AC000-memory.dmp

              Filesize

              48KB

            • memory/2272-221-0x0000000004C70000-0x0000000004C80000-memory.dmp

              Filesize

              64KB

            • memory/3112-165-0x00000000012C0000-0x00000000012D6000-memory.dmp

              Filesize

              88KB

            • memory/3192-155-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

              Filesize

              64KB

            • memory/3192-134-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

              Filesize

              64KB

            • memory/3192-135-0x0000000006210000-0x0000000006232000-memory.dmp

              Filesize

              136KB

            • memory/3192-133-0x00000000003D0000-0x00000000003DC000-memory.dmp

              Filesize

              48KB

            • memory/3908-182-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

              Filesize

              64KB

            • memory/3908-179-0x00000000004D0000-0x00000000004DC000-memory.dmp

              Filesize

              48KB

            • memory/4568-136-0x0000000002A20000-0x0000000002A56000-memory.dmp

              Filesize

              216KB

            • memory/4568-141-0x0000000002A10000-0x0000000002A20000-memory.dmp

              Filesize

              64KB

            • memory/4568-140-0x00000000059B0000-0x0000000005A16000-memory.dmp

              Filesize

              408KB

            • memory/4568-139-0x0000000002A10000-0x0000000002A20000-memory.dmp

              Filesize

              64KB

            • memory/4568-153-0x0000000007660000-0x0000000007CDA000-memory.dmp

              Filesize

              6.5MB

            • memory/4568-151-0x0000000005FF0000-0x000000000600E000-memory.dmp

              Filesize

              120KB

            • memory/4568-152-0x0000000002A10000-0x0000000002A20000-memory.dmp

              Filesize

              64KB

            • memory/4568-137-0x00000000050B0000-0x00000000056D8000-memory.dmp

              Filesize

              6.2MB

            • memory/4568-158-0x0000000002A10000-0x0000000002A20000-memory.dmp

              Filesize

              64KB

            • memory/4568-157-0x0000000002A10000-0x0000000002A20000-memory.dmp

              Filesize

              64KB

            • memory/4568-156-0x0000000002A10000-0x0000000002A20000-memory.dmp

              Filesize

              64KB

            • memory/4568-138-0x0000000005890000-0x00000000058F6000-memory.dmp

              Filesize

              408KB

            • memory/4568-154-0x00000000064E0000-0x00000000064FA000-memory.dmp

              Filesize

              104KB