Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2023 06:46
Static task
static1
Behavioral task
behavioral1
Sample
7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe
Resource
win10v2004-20230220-en
General
-
Target
7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe
-
Size
1.2MB
-
MD5
b27e75867100b7f34b35cf147b7ce92e
-
SHA1
e1b51e321d8a5595cc0382198a6ab34c98924194
-
SHA256
7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e
-
SHA512
b71ba509772548d94d7a31685527f454ffc12380fa1537ef133140ece9f67d9070d21497b5694adbe405c528bb83266409053f754a437cde9caf361797318773
-
SSDEEP
24576:H1qOg/vTimfbpDY0aV9+rOL54vwe7r9MCdoavl30Og:zgHGmfbp+V9fqvwe7r9MOl
Malware Config
Extracted
redline
TPB
amrican-sport-live-stream.cc:4581
-
auth_value
9af3f668d2aa93965a3f83753e8ccb3f
Signatures
-
Detect PureCrypter injector 33 IoCs
resource yara_rule behavioral1/memory/2268-135-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-136-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-138-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-140-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-142-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-144-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-146-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-148-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-150-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-152-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-154-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-156-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-158-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-160-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-162-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-164-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-166-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-168-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-170-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-172-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-174-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-176-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-178-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-180-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-182-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-184-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-186-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-188-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-190-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-192-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-194-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-196-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter behavioral1/memory/2268-198-0x0000000004F60000-0x00000000051C9000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 2272 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2272 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe 85 PID 2268 wrote to memory of 2272 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe 85 PID 2268 wrote to memory of 2272 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe 85 PID 2268 wrote to memory of 2272 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe 85 PID 2268 wrote to memory of 2272 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe 85 PID 2268 wrote to memory of 2272 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe 85 PID 2268 wrote to memory of 2272 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe 85 PID 2268 wrote to memory of 2272 2268 7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe"C:\Users\Admin\AppData\Local\Temp\7304e4710381b20058acc561ff7a36df7e2ce614e8d8e045452bbfaec9f1ab6e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵PID:2272
-