Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2023 08:48

General

  • Target

    tmp.exe

  • Size

    93KB

  • MD5

    f7fcd7edfb46bf4003106731a9f2c22a

  • SHA1

    11c4ea0b37b293787eb2e19b61902ee19a207fa9

  • SHA256

    1fe0daa8e8374c77b7bf90a48e1c9d309cdc686cca84441a84957cedbf039c70

  • SHA512

    a46f2e75344a6d6e5595e4a942cd6284c16e1a382550ba3fefeb77a69dc93ac744fc3e59dfed3d08a504622d87fcfbda918395787d3a53b2ce9cc98fe7d2d6b5

  • SSDEEP

    1536:jAjj3c+neUO4HnN24PSSAwyLExMANYxkhrmLxyn4Yer6aIaSyeoxsfW9mXl1h:jAXc+eUO4HnNJP/aLEOAMEKy44aIJyfm

Malware Config

Extracted

Family

purecrypter

C2

http://revitape.com/gdy/Pftcp.dll

Signatures

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1308-54-0x0000000000920000-0x000000000093C000-memory.dmp

    Filesize

    112KB

  • memory/1308-55-0x00000000008D0000-0x0000000000910000-memory.dmp

    Filesize

    256KB

  • memory/1308-56-0x00000000008D0000-0x0000000000910000-memory.dmp

    Filesize

    256KB